<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=2216" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-07-07T03:07:51+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=2216</id>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-07-07T03:07:51+01:00</updated>
<published>2016-07-07T03:07:51+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8773#p8773</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8773#p8773"/>
<title type="html"><![CDATA[Re: [Problem] Using Neo for OSX El Capitan Login]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8773#p8773"><![CDATA[
The answer turned out to be very simple. There is a difference (though it is unclear why or how) between a certificate added via Keychain Access, and one added via &quot;security&quot; command line interface.<br /><br />So it was not good enough to add the Root CA for the certificate issuer to the System keychain via Keychain Access utility. The solution was to do remove that CA cert from System keychain and re-add it via<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">sudo security add-trusted-cert -d -k &quot;/Library/Keychains/System.keychain&quot; &lt;path-to-the-issuing-CA-certificate&gt;<br /></div><br /><br />After that has been done, smartcard login and screensaver unlock started working on El Capitan 10.11.5.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Thu Jul 07, 2016 3:07 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-07-04T13:52:33+01:00</updated>
<published>2016-07-04T13:52:33+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8762#p8762</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8762#p8762"/>
<title type="html"><![CDATA[Re: [Problem] Using Neo for OSX El Capitan Login]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8762#p8762"><![CDATA[
I have to correct myself.<br /><br />All the steps I outlined were necessary but insufficient.<br /><br />Here are my steps:<br /><br /><ul><li>Install the current OpenSC</li><li>Install a <span style="text-decoration: underline">working</span> tokend (happens to be <a href="https://github.com/mouse07410/OpenSC.tokend" class="postlink">https://github.com/mouse07410/OpenSC.tokend</a>)</li><li>Placed my CA in the System keychain, set it as &quot;Always Trusted&quot;</li><li>Configured the NEO, ensuring it has CHUID and CCC installed; then added keys + certificates (issued by my CA)</li><li>Certificate in the slot 9A has  <div class="codetitle"><b>Code:</b></div><div class="codecontent">Key Usage = Digital Signature</div> and <div class="codetitle"><b>Code:</b></div><div class="codecontent">Extended Key Usage = Client Authentication, Smartcard Logon</div></li><li>Issued <div class="codetitle"><b>Code:</b></div><div class="codecontent">sudo security authorizationdb smartcard enable</div> command</li><li>Did <div class="codetitle"><b>Code:</b></div><div class="codecontent">sc_auth hash</div>, which showed my NEO's pubkey hash among the other keys</li><li>Did <div class="codetitle"><b>Code:</b></div><div class="codecontent">sudo sc_auth accept -u myself -h &lt;the_hash_from_above&gt;</div></li><li>Verified that <div class="codetitle"><b>Code:</b></div><div class="codecontent">sc_auth list -u myself</div> shows that hash</li><li>Verified that <div class="codetitle"><b>Code:</b></div><div class="codecontent">Directory Utility</div> shows that hash in the user record</li><li>Verified that Keychain shows all the certs on the NEO as valid</li><li>Verified that all the &quot;normal&quot; Mac OS X programs can work with NEO keys/certs (Apple Mail, Safari, Chrome, Keychain)</li></ul><br />At this point, according to what I read so far, smartcard logon should just work, i.e. when you insert your token the login screen should change and prompt for your PIN instead of your password. In my case it does not happen. System log shows the same error as the other people saw:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">authorizationhost&#91;1609&#93;: Certificate could not be verified: 5<br /></div><br /><br />And this cannot be because certificate is self-signed - because mine is not! My certificates are all issued by a trusted CA.<br /><br />So, to noah977: check that your tokend is fine, e.g., by using Safari and/or Apple Mail. If they can work with NEO, then your tokend is probably OK.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Mon Jul 04, 2016 1:52 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Uriel]]></name></author>
<updated>2016-02-16T20:04:40+01:00</updated>
<published>2016-02-16T20:04:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8336#p8336</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8336#p8336"/>
<title type="html"><![CDATA[Re: [Problem] Using Neo for OSX El Capitan Login]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8336#p8336"><![CDATA[
Export a Certificate Signing Request using yubico-piv-tool, get it signed, and import the resultin certificate back.<br /><br />I think that you can add trusted CA yourself (and you can run that CA yourself).<br /><br />Or you can buy a certificate from an established vendor.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3568">Uriel</a> — Tue Feb 16, 2016 8:04 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[noah977]]></name></author>
<updated>2016-02-15T02:05:50+01:00</updated>
<published>2016-02-15T02:05:50+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8319#p8319</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8319#p8319"/>
<title type="html"><![CDATA[Re: [Problem] Using Neo for OSX El Capitan Login]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8319#p8319"><![CDATA[
OK,<br /><br />One more step closer.<br /><br />Looking at the error logs on my Macbook (Using Console App), I can see the following errors:<br /><br />14/2/2016 10:15:00.183 PM authorizationhost[1609]: Certificate could not be verified: 5<br /><br />From what little I could find on Google, it appears as if OS X is refusing to recognize the digital certificate on the Yubikey because <strong>It is self signed</strong>  <br /><br />Now, the yubikey-piv-tool will create digital certs, on the device, but they're not signed by anyone.  And, it looks like OS X only accepts certs signed by a recognizable CA.  So, does this mean it is impossible to use a yubikey PIV to authenticate?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4194">noah977</a> — Mon Feb 15, 2016 2:05 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[noah977]]></name></author>
<updated>2016-02-14T15:14:30+01:00</updated>
<published>2016-02-14T15:14:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8317#p8317</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8317#p8317"/>
<title type="html"><![CDATA[Re: [Problem] Using Neo for OSX El Capitan Login]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8317#p8317"><![CDATA[
Got a little further.<br /><br />Figured out how to get sc_auth to add the PIV hash to my user.  <br /><br />According to everything I've read, that should be the final step.  However, the login process hasn't changed.   When I insert the yubikey, the logon window flashes quickly, but then still show the password prompt instead of the PIN.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4194">noah977</a> — Sun Feb 14, 2016 3:14 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[noah977]]></name></author>
<updated>2016-02-13T03:48:34+01:00</updated>
<published>2016-02-13T03:48:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8314#p8314</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8314#p8314"/>
<title type="html"><![CDATA[[Problem] Using Neo for OSX El Capitan Login]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2216&amp;p=8314#p8314"><![CDATA[
Hi,<br /><br />I like to use the PIV features of my NEO to login to my macbook. <br /><br />Generally following the guide here:  <a href="https://randomoracle.wordpress.com/2015/02/09/smart-card-logon-for-os-x-part-iii/" class="postlink">https://randomoracle.wordpress.com/2015/02/09/smart-card-logon-for-os-x-part-iii/</a><br /><br />My understanding is that I need to use the sc_auth command to set this up.  However, sc_auth does not show my NEO at all.<br /><br />Some details:<br />- yubikey-piv-tool sees the NEO and it is fine<br />- OSX Keychain Access program sees the NEO, and show the keys inside<br />- pcsctest program shows the NEO and it is fine<br />- pkcs15-tool shows the NEO, can list contents, etc.<br /><br />- SC_AUTH DOES NOT SHOW THE NEO<br /><br />So, every tool I can think of correctly identifies the NEO as a PIV card, and can see that it has keys, certificates, etc.  <br /><br />Any suggestions on how fix this?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4194">noah977</a> — Sat Feb 13, 2016 3:48 am</p><hr />
]]></content>
</entry>
</feed>