<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=1145" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-07-23T00:18:36+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=1145</id>
<entry>
<author><name><![CDATA[fbnaia]]></name></author>
<updated>2015-07-23T00:18:36+01:00</updated>
<published>2015-07-23T00:18:36+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1145&amp;p=7642#p7642</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1145&amp;p=7642#p7642"/>
<title type="html"><![CDATA[Re: [Resolved] Yubikey Neo and PGP Applet issue.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1145&amp;p=7642#p7642"><![CDATA[
I am getting the same problem with firmware 3.3.0 and openpgp applet ver 1.0.8.<br /><br />I tried updating the openpgp applet but i don't know the card manager keys.<br /><br />I am aware of the security advisory YSA-2015-1, but it's my understanding that it should not affect encryption/decryption.<br /><br />Is there a way to update the applet or fix this issue?<br /><br />[Fixed]<br /><br />I finally resolved the problems by unblocking the pin and changing the pin to something else. (previously i was setting the same pin after unblocking but that did not work.)<br /><br />I was also getting errors with CHV2 on 'verify' command. I wasn't able to generate new keys and also getting &quot;Conditions of use not satisfied&quot; on some commands and couldn't authenticate SSH sessions or sign other keys... Which lead me to this tutorial <a href="http://25thandclement.com/~william/YubiKey_NEO.html" class="postlink">http://25thandclement.com/~william/YubiKey_NEO.html</a> that pointed out some similar issues fixed by unblocking the pin.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3838">fbnaia</a> — Thu Jul 23, 2015 12:18 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[westonmyers]]></name></author>
<updated>2013-08-26T12:51:09+01:00</updated>
<published>2013-08-26T12:51:09+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1145&amp;p=4303#p4303</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1145&amp;p=4303#p4303"/>
<title type="html"><![CDATA[Re: [Resolved] Yubikey Neo and PGP Applet issue.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1145&amp;p=4303#p4303"><![CDATA[
Hello,<br /><br />The issue was indeed with the Yubikey Neo OpenPGP applet on the device. This is resolved by updating the applet to the latest version. (Keys are lost at this time since import is not supported.)<br /><br /><a href="https://github.com/Yubico/ykneo-openpgp/issues/11" class="postlink">Thread</a> at the GitHub account regarding this issue.<br /><br />Regards,<br />Weston<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2553">westonmyers</a> — Mon Aug 26, 2013 12:51 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[westonmyers]]></name></author>
<updated>2013-08-24T09:25:09+01:00</updated>
<published>2013-08-24T09:25:09+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1145&amp;p=4300#p4300</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1145&amp;p=4300#p4300"/>
<title type="html"><![CDATA[[Resolved] Yubikey Neo and PGP Applet issue.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1145&amp;p=4300#p4300"><![CDATA[
Hello,<br /><br />I created a pgp keypair with my Yubikey as outlined. It seemed to work as far as I knew. Today came the time to actually test it. That said, it's not behaving at all. It seems that the PIN is not being accepted properly. Below is the excerpt of my terminal while working on this. (Encryption and Auth keys edited out as I felt this was unnecessary.)<br /><br />Notable things:<br />PIN retry counter at 0.<br />I unblock it successfully and use a simple password (123456) for this example.<br />(While not shown here, I can do a &quot;verify&quot; command here and the PIN retry counter will tick down to 2.)<br />I exit out though to do what I was hoping.<br />I have a file that a friend encrypted.<br />It's not taking the password.<br />Fun times.<br /><br />Thanks for your time,<br />Weston<br /><br />Arch Linux (Fully updated.)<br />gpg (GnuPG) 2.0.21<br />libgcrypt 1.5.3<br /><br /><br />➜  Downloads  <span style="color: #FF0000">gpg --card-edit</span>                                          <br />gpg: enabled debug flags: memstat<br /><br />Application ID ...: D2760001240102000000000000010000<br />Version ..........: 2.0<br />Manufacturer .....: test card<br />Serial number ....: 00000001<br />Name of cardholder: Weston Myers<br />Language prefs ...: en<br />Sex ..............: male<br />URL of public key : http://sec.westonmyers.com/pgppubstore/weston+pgp@ieee.org<br />Login data .......: westonmyers<br />Signature PIN ....: not forced<br />Key attributes ...: 2048R 2048R 2048R<br />Max. PIN lengths .: 127 127 127<br />PIN retry counter : <span style="color: #FF0000">0</span> 3 3<br />Signature counter : 14<br />Signature key ....: A679 6687 3661 82F4 2A9B  BE0E FAA5 D450 6A4B B09A<br />      created ....: 2013-08-16 08:01:24<br />Encryption key....: [REDACTED]<br />      created ....: 2013-08-16 08:01:24<br />Authentication key: [REDACTED]<br />      created ....: 2013-08-16 08:01:24<br />General key info..: <br />pub  2048R/6A4BB09A 2013-08-16 Weston L Myers (No trees were killed to send this message; however, a large number of electrons were terribly inconvenienced...) &lt;weston+p<br />gp@ieee.org&gt;<br />sec&gt;  2048R/6A4BB09A  created: 2013-08-16  expires: 2014-08-16<br />                      card-no: 0000 00000001<br />ssb&gt;  2048R/493D77FB  created: 2013-08-16  expires: 2014-08-16<br />                      card-no: 0000 00000001<br />ssb&gt;  2048R/A42FF1AE  created: 2013-08-16  expires: 2014-08-16<br />                      card-no: 0000 00000001<br /><br />gpg/card&gt; <span style="color: #FF0000">unblock</span><br />gpg: OpenPGP card no. D2760001240102000000000000010000 detected<br /><span style="color: #FF0000">PIN changed.</span><br /><br />gpg/card&gt; <span style="color: #FF0000">list</span>                                                                                                                                                  <br /><br />Application ID ...: D2760001240102000000000000010000<br />Version ..........: 2.0<br />Manufacturer .....: test card<br />Serial number ....: 00000001<br />Name of cardholder: Weston Myers<br />Language prefs ...: en<br />Sex ..............: male<br />URL of public key : http://sec.westonmyers.com/pgppubstore/weston+pgp@ieee.org<br />Login data .......: westonmyers<br />Signature PIN ....: not forced<br />Key attributes ...: 2048R 2048R 2048R<br />Max. PIN lengths .: 127 127 127<br />PIN retry counter : <span style="color: #FF0000">3</span> 3 3<br />Signature counter : 14<br />Signature key ....: A679 6687 3661 82F4 2A9B  BE0E FAA5 D450 6A4B B09A<br />      created ....: 2013-08-16 08:01:24<br />Encryption key....: [REDACTED]<br />      created ....: 2013-08-16 08:01:24<br />Authentication key: [REDACTED]<br />      created ....: 2013-08-16 08:01:24<br />General key info..: <br />pub  2048R/6A4BB09A 2013-08-16 Weston L Myers (No trees were killed to send this message; however, a large number of electrons were terribly inconvenienced...) &lt;weston+p<br />gp@ieee.org&gt;<br />sec&gt;  2048R/6A4BB09A  created: 2013-08-16  expires: 2014-08-16<br />                      card-no: 0000 00000001<br />ssb&gt;  2048R/493D77FB  created: 2013-08-16  expires: 2014-08-16<br />                      card-no: 0000 00000001<br />ssb&gt;  2048R/<span style="color: #FF0000">A42FF1AE</span>  created: 2013-08-16  expires: 2014-08-16<br />                      card-no: 0000 00000001<br /><br />gpg/card&gt; <span style="color: #FF0000">quit</span><br />random usage: poolsize=600 mixed=0 polls=0/0 added=0/0<br />              outmix=0 getlvl1=0/0 getlvl2=0/0<br />secmem usage: 0/32768 bytes in 0 blocks<br />➜  Downloads  gpg -v -o doc.txt --decrypt signed_6A4BB09A_encrypted.acs<br />gpg: enabled debug flags: memstat<br />Version: GnuPG v1.4.12 (Darwin)<br />gpg: armor header: <br />gpg: public key is A42FF1AE<br />gpg: using subkey <span style="color: #FF0000">A42FF1AE</span> instead of primary key 6A4BB09A<br />gpg: using subkey A42FF1AE instead of primary key 6A4BB09A<br />gpg: encrypted with 2048-bit RSA key, ID A42FF1AE, created 2013-08-16<br />      &quot;Weston L Myers (No trees were killed to send this message; however, a large number of electrons were terribly inconvenienced...) &lt;weston+pgp@ieee.org&gt;&quot;<br />gpg: public key decryption failed: <span style="color: #FF0000">Card error</span><br />gpg: decryption failed: <span style="color: #FF0000">No secret key</span><br />random usage: poolsize=600 mixed=0 polls=0/0 added=0/0<br />              outmix=0 getlvl1=0/0 getlvl2=0/0<br />secmem usage: 0/32768 bytes in 0 blocks<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2553">westonmyers</a> — Sat Aug 24, 2013 9:25 am</p><hr />
]]></content>
</entry>
</feed>