<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=1286" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-02-20T12:45:40+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=1286</id>
<entry>
<author><name><![CDATA[Klas]]></name></author>
<updated>2014-02-20T12:45:40+01:00</updated>
<published>2014-02-20T12:45:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4964#p4964</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4964#p4964"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4964#p4964"><![CDATA[
Right now we don't provide an upgrade path for the applet.<br /><br />Most functions should work fine with that applet version, but you're limited to the RSA-2048 algorithm.<br /><br />/klas<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2019">Klas</a> — Thu Feb 20, 2014 12:45 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[guyome]]></name></author>
<updated>2014-02-20T11:26:05+01:00</updated>
<published>2014-02-20T11:26:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4963#p4963</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4963#p4963"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4963#p4963"><![CDATA[
Yes, I have the version 0.0.3. Is there a way to upgrade it or ?<br /><br />BTW, the way to change PIN/PUK with yubico-piv-tool seems slightly buggy in this version.<br /><br />But anyway thanks for the help.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2768">guyome</a> — Thu Feb 20, 2014 11:26 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Klas]]></name></author>
<updated>2014-02-17T08:36:12+01:00</updated>
<published>2014-02-17T08:36:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4947#p4947</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4947#p4947"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4947#p4947"><![CDATA[
Hello,<br /><br />You've probably got a slightly older version of the PIV applet, not supporting ECC. I didn't give the tool any knowledge about versions (yet?) to keep it simple.<br /><br />If you give the tool the flag -a version it will tell you what version of the applet is running, I'm guessing on 0.0.3 for you, ecc functionality was added in 0.1.0. RSA-2048 should work fine though.<br /><br />The admin key (also called management key) is used to authenticate to the card for administrative functions like generating and importing keys.<br /><br />/klas<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2019">Klas</a> — Mon Feb 17, 2014 8:36 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[guyome]]></name></author>
<updated>2014-02-15T17:46:44+01:00</updated>
<published>2014-02-15T17:46:44+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4942#p4942</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4942#p4942"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4942#p4942"><![CDATA[
Hello,<br /><br />Thank a lot for the PIV-tool. I successed to import on the yubikey a certificate from CaCert and it works smoothly with opensc/pkcs11 on ubuntu a least.<br /><br />But I can't generate any key on the last ubuntu with Yubico PPA.<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">yubico-piv-tool -s 9a -A ECCP256 -a generate --verbose=2<br />parsed key: 01 02 03 04 05 06 07 08 01 02 03 04 05 06 07 08 01 02 03 04 05 06 07 08 <br />using reader 'Yubico Yubikey NEO OTP+CCID 00 00' matching 'Yubikey'.<br />&gt; 00 a4 04 00 05 a0 00 00 03 08 <br />&lt; 61 11 4f 06 00 00 10 00 01 00 79 07 4f 05 a0 00 00 03 08 90 00 <br />&gt; 00 87 03 9b 04 7c 02 80 00 <br />&lt; 7c 0a 80 08 de 8c d3 49 4b d6 85 cc 90 00 <br />&gt; 00 87 03 9b 0c 7c 0a 80 08 63 f4 87 37 d3 a2 75 58 <br />&lt; 90 00 <br />Successful applet authentication.<br />Now processing for action 1.<br />Going to send 5 bytes in this go.<br />&gt; 00 47 00 9a 05 ac 03 80 01 11 <br />&lt; 6a 80 <br />Failed to generate new key.<br /></div><br /><br />Any idea how fix that ?<br /><br />Besides, what is the meaning of admin key ?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2768">guyome</a> — Sat Feb 15, 2014 5:46 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[air]]></name></author>
<updated>2014-02-14T05:58:25+01:00</updated>
<published>2014-02-14T05:58:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4937#p4937</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4937#p4937"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4937#p4937"><![CDATA[
Thanks Klas, I have updated to fix the CHUID bug.<br /><br />I still need to experiment, but it sounds like I won't need the CHUID signed, I just need Windows to use the Smart Card functionality.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2675">air</a> — Fri Feb 14, 2014 5:58 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Klas]]></name></author>
<updated>2014-02-13T08:54:14+01:00</updated>
<published>2014-02-13T08:54:14+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4931#p4931</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4931#p4931"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4931#p4931"><![CDATA[
Good. I just discovered (and fixed) a bug with how the chuid is generated in the yubico-piv-tool, you might want to run newer code there.<br /><br />The chuid generated by the yubico-piv-tool isn't signed, but that doesn't seem to be an issue for any system I've run into. If you need a signed chuid we get into more complex issues..<br /><br />/klas<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2019">Klas</a> — Thu Feb 13, 2014 8:54 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[air]]></name></author>
<updated>2014-02-13T03:13:54+01:00</updated>
<published>2014-02-13T03:13:54+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4930#p4930</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4930#p4930"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4930#p4930"><![CDATA[
Thank you for the update. I got the default admin key from Yubico earlier via email, with some rough instructions. I managed to create a key pair on the device, with the public key extracted, to create the CSR and sign it, and load the certificate onto the card/applet. The part I wasn't sure about was generating unique CHUIDs as it seemed that the was surrounding data, and I had read that it is meant to be signed.<br /><br />I have compiled the yubico-piv-tool from GitHub sources. I will experiment, with it, but it looks like it will make the process flow much easier, and it supports generating a unique CHUID, which one of the last road-blocks for me. Thanks!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2675">air</a> — Thu Feb 13, 2014 3:13 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Klas]]></name></author>
<updated>2014-02-12T08:05:46+01:00</updated>
<published>2014-02-12T08:05:46+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4929#p4929</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4929#p4929"/>
<title type="html"><![CDATA[Re: [QUESTION] Yubikey NEO with PIV Applet - How to Init/Set]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4929#p4929"><![CDATA[
Hello,<br /><br />Sorry for a late reply here.. You've noticed some of this but I'll go over it again:<br />default pin: 123456<br />default unblock pin: 12345678<br />default admin key (3des key): 010203040506070801020304050607080102030405060708<br /><br />We've just published a little tool that can be used to do some of the administrative tasks with the piv applet&#058; <!-- m --><a class="postlink" href="http://opensource.yubico.com/yubico-piv-tool/">http://opensource.yubico.com/yubico-piv-tool/</a><!-- m --><br /><br />If you're using ubuntu binaries of it is available in our PPA at: <!-- m --><a class="postlink" href="https://launchpad.net/~yubico/+archive/stable">https://launchpad.net/~yubico/+archive/stable</a><!-- m --> binaries for windows and osX is available at the opensource.yubico.com site.<br /><br />/klas<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2019">Klas</a> — Wed Feb 12, 2014 8:05 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[air]]></name></author>
<updated>2014-01-14T05:10:04+01:00</updated>
<published>2014-01-14T05:10:04+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4801#p4801</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4801#p4801"/>
<title type="html"><![CDATA[[QUESTION] Yubikey NEO with PIV Applet - How to Init/Setup?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1286&amp;p=4801#p4801"><![CDATA[
Hi All,<br /><br />I purchased several Yubikey NEOs with the PIV applet (beta). I am not sure how to set it up or initialise it though. I am using Linux and OpenSC, although later I will be supporting other operating systems such as Windows and Mac OS X.<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ ykneomgr -a<br />0: a0000000035350<br />1: a0000005272001<br />2: a000000308<br />3: a0000005272101<br />4: d27600012401</div><br /><br />AID a000000308 is the PIV applet, which appears to be ID-ONE by Oberthur Technologies - &quot;Personal Identity Verification (PIV) / ID-ONE PIV BIO&quot;.<br /><br />I haven't found any good documentation available on the Internet yet from Oberthur regarding the setup and initialisation.<br /><br />Using OpenSC tools, such as piv-tool, pkcs15-tool, and pkcs11-tool, I can see that the certificates etc. have not yet been initialised.<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ piv-tool -n<br />Using reader with a card: Yubico Yubikey NEO OTP+CCID 00 00<br />PIV-II card<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pcsc_scan <br />PC/SC device scanner<br />V 1.4.21 (c) 2001-2011, Ludovic Rousseau &lt;ludovic.rousseau@free.fr&gt;<br />Compiled with PC/SC lite version: 1.8.8<br />Using reader plug'n play mechanism<br />Scanning present readers...<br />0: Yubico Yubikey NEO OTP+CCID 00 00<br /><br />Tue Jan 14 14:48:31 2014<br />Reader 0: Yubico Yubikey NEO OTP+CCID 00 00<br />  Card state: Card inserted, <br />  ATR: 3B FA 13 00 00 81 31 FE 15 59 75 62 69 6B 65 79 4E 45 4F A6<br /><br />ATR: 3B FA 13 00 00 81 31 FE 15 59 75 62 69 6B 65 79 4E 45 4F A6<br />+ TS = 3B --&gt; Direct Convention<br />+ T0 = FA, Y(1): 1111, K: 10 (historical bytes)<br />  TA(1) = 13 --&gt; Fi=372, Di=4, 93 cycles/ETU<br />    43010 bits/s at 4 MHz, fMax for Fi = 5 MHz =&gt; 53763 bits/s<br />  TB(1) = 00 --&gt; VPP is not electrically connected<br />  TC(1) = 00 --&gt; Extra guard time: 0<br />  TD(1) = 81 --&gt; Y(i+1) = 1000, Protocol T = 1 <br />-----<br />  TD(2) = 31 --&gt; Y(i+1) = 0011, Protocol T = 1 <br />-----<br />  TA(3) = FE --&gt; IFSC: 254<br />  TB(3) = 15 --&gt; Block Waiting Integer: 1 - Character Waiting Integer: 5<br />+ Historical bytes: 59 75 62 69 6B 65 79 4E 45 4F<br />  Category indicator byte: 59 (proprietary format)<br />+ TCK = A6 (correct checksum)<br /><br />Possibly identified card (using /home/eh/.cache/smartcard_list.txt):<br />3B FA 13 00 00 81 31 FE 15 59 75 62 69 6B 65 79 4E 45 4F A6<br />        Yubikey NEO<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs15-tool --list-data-objects<br />Using reader with a card: Yubico Yubikey NEO OTP+CCID 00 00<br />Reading data object &lt;0&gt;<br />applicationName: Card Capability Container<br />Label:           Card Capability Container<br />applicationOID:  2.16.840.1.101.3.7.1.219.0<br />Path:            db00<br />Data object read failed: File not found<br />Reading data object &lt;1&gt;<br />applicationName: Card Holder Unique Identifier<br />Label:           Card Holder Unique Identifier<br />applicationOID:  2.16.840.1.101.3.7.2.48.0<br />Path:            3000<br />Data object read failed: File not found<br />Reading data object &lt;2&gt;<br />applicationName: Unsigned Card Holder Unique Identifier<br />Label:           Unsigned Card Holder Unique Identifier<br />applicationOID:  2.16.840.1.101.3.7.2.48.2<br />Path:            3010<br />Data object read failed: File not found<br />Reading data object &lt;3&gt;<br />applicationName: X.509 Certificate for PIV Authentication<br />Label:           X.509 Certificate for PIV Authentication<br />applicationOID:  2.16.840.1.101.3.7.2.1.1<br />Path:            0101<br />Data object read failed: File not found<br />Reading data object &lt;4&gt;<br />applicationName: Cardholder Fingerprints<br />Label:           Cardholder Fingerprints<br />applicationOID:  2.16.840.1.101.3.7.2.96.16<br />Path:            6010<br />Auth ID:         01<br />Reading data object &lt;5&gt;<br />applicationName: Printed Information<br />Label:           Printed Information<br />applicationOID:  2.16.840.1.101.3.7.2.48.1<br />Path:            3001<br />Auth ID:         01<br />Reading data object &lt;6&gt;<br />applicationName: Cardholder Facial Image<br />Label:           Cardholder Facial Image<br />applicationOID:  2.16.840.1.101.3.7.2.96.48<br />Path:            6030<br />Auth ID:         01<br />Reading data object &lt;7&gt;<br />applicationName: X.509 Certificate for Digital Signature<br />Label:           X.509 Certificate for Digital Signature<br />applicationOID:  2.16.840.1.101.3.7.2.1.0<br />Path:            0100<br />Data object read failed: File not found<br />Reading data object &lt;8&gt;<br />applicationName: X.509 Certificate for Key Management<br />Label:           X.509 Certificate for Key Management<br />applicationOID:  2.16.840.1.101.3.7.2.1.2<br />Path:            0102<br />Data object read failed: File not found<br />Reading data object &lt;9&gt;<br />applicationName: X.509 Certificate for Card Authentication<br />Label:           X.509 Certificate for Card Authentication<br />applicationOID:  2.16.840.1.101.3.7.2.5.0<br />Path:            0500<br />Data object read failed: File not found<br />Reading data object &lt;10&gt;<br />applicationName: Security Object<br />Label:           Security Object<br />applicationOID:  2.16.840.1.101.3.7.2.144.0<br />Path:            9000<br />Data object read failed: File not found<br />Reading data object &lt;11&gt;<br />applicationName: Discovery Object<br />Label:           Discovery Object<br />applicationOID:  2.16.840.1.101.3.7.2.96.80<br />Path:            6050<br />Data Object (20 bytes): &lt; 7E 12 4F 0B A0 00 00 03 08 00 00 10 00 01 00 5F 2F 02 40 00 &gt;<br />Reading data object &lt;12&gt;<br />applicationName: Cardholder Iris Image<br />Label:           Cardholder Iris Image<br />applicationOID:  2.16.840.1.101.3.7.2.16.21<br />Path:            1015<br />Data object read failed: File not found<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs15-tool --list-pins<br />Using reader with a card: Yubico Yubikey NEO OTP+CCID 00 00<br />PIN &#91;PIV Card Holder pin&#93;<br />        Object Flags   : &#91;0x1&#93;, private<br />        ID             : 01<br />        Flags          : &#91;0x22&#93;, local, needs-padding<br />        Length         : min_len:4, max_len:8, stored_len:8<br />        Pad char       : 0xFF<br />        Reference      : 128<br />        Type           : ascii-numeric<br /><br />PIN &#91;PIV PUK&#93;<br />        Object Flags   : &#91;0x1&#93;, private<br />        ID             : 02<br />        Flags          : &#91;0xE2&#93;, local, needs-padding, unblockingPin, soPin<br />        Length         : min_len:4, max_len:8, stored_len:8<br />        Pad char       : 0xFF<br />        Reference      : 129<br />        Type           : ascii-numeric<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs11-tool --module /usr/lib/opensc-pkcs11.so --show-info<br />Cryptoki version 2.20<br />Manufacturer     OpenSC (www.opensc-project.org)<br />Library          Smart card PKCS#11 API (ver 0.0)<br />Using slot 1 with a present token (0x1)<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs11-tool --module /usr/lib/opensc-pkcs11.so --list-slots<br />Available slots:<br />Slot 0 (0xffffffffffffffff): Virtual hotplug slot<br />  (empty)<br />Slot 1 (0x1): Yubico Yubikey NEO OTP+CCID 00 00<br />  token label:   PIV_II (PIV Card Holder pin)<br />  token manuf:   piv_II<br />  token model:   PKCS#15 emulated<br />  token flags:   rng, readonly, login required, PIN initialized, token initialized<br />  serial num  :  00000000<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs11-tool --module /usr/lib/opensc-pkcs11.so --list-mechanisms<br />Using slot 1 with a present token (0x1)<br />Supported mechanisms:<br />  SHA-1, digest<br />  SHA256, digest<br />  SHA384, digest<br />  SHA512, digest<br />  MD5, digest<br />  RIPEMD160, digest<br />  GOSTR3411, digest<br />  ECDSA, keySize={256,384}, hw, sign, other flags=0x1800000<br />  ECDSA-SHA1, keySize={256,384}, hw, sign, other flags=0x1800000<br />  ECDSA-KEY-PAIR-GEN, keySize={256,384}, hw, generate_key_pair, other flags=0x1800000<br />  RSA-X-509, keySize={1024,3072}, hw, decrypt, sign, verify<br />  RSA-PKCS, keySize={1024,3072}, hw, decrypt, sign, verify<br />  SHA1-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  SHA256-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  MD5-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  RIPEMD160-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  RSA-PKCS-KEY-PAIR-GEN, keySize={1024,3072}, generate_key_pair<br /></div><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs11-tool --module /usr/lib/opensc-pkcs11.so --list-objects<br />Using slot 1 with a present token (0x1)<br />Data object 877800048<br />  label:          'Card Capability Container'<br />  application:    'Card Capability Container'<br />  app_id:         2.16.840.1.101.3.7.1.219.0<br />  flags:          <br />Data object 877806224<br />  label:          'Card Holder Unique Identifier'<br />  application:    'Card Holder Unique Identifier'<br />  app_id:         2.16.840.1.101.3.7.2.48.0<br />  flags:          <br />Data object 877806320<br />  label:          'Unsigned Card Holder Unique Identifier'<br />  application:    'Unsigned Card Holder Unique Identifier'<br />  app_id:         2.16.840.1.101.3.7.2.48.2<br />  flags:          <br />Data object 877806416<br />  label:          'X.509 Certificate for PIV Authentication'<br />  application:    'X.509 Certificate for PIV Authentication'<br />  app_id:         2.16.840.1.101.3.7.2.1.1<br />  flags:          <br />Data object 877806800<br />  label:          'X.509 Certificate for Digital Signature'<br />  application:    'X.509 Certificate for Digital Signature'<br />  app_id:         2.16.840.1.101.3.7.2.1.0<br />  flags:          <br />Data object 877806896<br />  label:          'X.509 Certificate for Key Management'<br />  application:    'X.509 Certificate for Key Management'<br />  app_id:         2.16.840.1.101.3.7.2.1.2<br />  flags:          <br />Data object 877806992<br />  label:          'X.509 Certificate for Card Authentication'<br />  application:    'X.509 Certificate for Card Authentication'<br />  app_id:         2.16.840.1.101.3.7.2.5.0<br />  flags:          <br />Data object 877807088<br />  label:          'Security Object'<br />  application:    'Security Object'<br />  app_id:         2.16.840.1.101.3.7.2.144.0<br />  flags:          <br />Data object 877807184<br />  label:          'Discovery Object'<br />  application:    'Discovery Object'<br />  app_id:         2.16.840.1.101.3.7.2.96.80<br />  flags:          <br /></div><br /><br />piv-tool cannot read the serial, even as root:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># piv-tool --serial<br />Using reader with a card: Yubico Yubikey NEO OTP+CCID 00 00<br />sc_card_ctl(*, SC_CARDCTL_GET_SERIALNR, *) failed -1201<br /></div><br /><br />But pkcs15-tool will print the serial when dumping:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs15-tool --dump<br />Using reader with a card: Yubico Yubikey NEO OTP+CCID 00 00<br />PKCS#15 Card &#91;PIV_II&#93;:<br />        Version        : 0<br />        Serial number  : 00000000<br />        Manufacturer ID: piv_II <br />        Flags          : <br /><br />PIN &#91;PIV Card Holder pin&#93;<br />        Object Flags   : &#91;0x1&#93;, private<br />        ID             : 01<br />        Flags          : &#91;0x22&#93;, local, needs-padding<br />        Length         : min_len:4, max_len:8, stored_len:8<br />        Pad char       : 0xFF<br />        Reference      : 128<br />        Type           : ascii-numeric<br /><br />PIN &#91;PIV PUK&#93;<br />        Object Flags   : &#91;0x1&#93;, private<br />        ID             : 02<br />        Flags          : &#91;0xE2&#93;, local, needs-padding, unblockingPin, soPin<br />        Length         : min_len:4, max_len:8, stored_len:8<br />        Pad char       : 0xFF<br />        Reference      : 129<br />        Type           : ascii-numeric<br /><br />Reading data object &lt;0&gt;<br />applicationName: Card Capability Container<br />Label:           Card Capability Container<br />applicationOID:  2.16.840.1.101.3.7.1.219.0<br />Path:            db00<br />Data object read failed: File not found<br />Reading data object &lt;1&gt;<br />applicationName: Card Holder Unique Identifier<br />Label:           Card Holder Unique Identifier<br />applicationOID:  2.16.840.1.101.3.7.2.48.0<br />Path:            3000<br />Data object read failed: File not found<br />Reading data object &lt;2&gt;<br />applicationName: Unsigned Card Holder Unique Identifier<br />Label:           Unsigned Card Holder Unique Identifier<br />applicationOID:  2.16.840.1.101.3.7.2.48.2<br />Path:            3010<br />Data object read failed: File not found<br />Reading data object &lt;3&gt;<br />applicationName: X.509 Certificate for PIV Authentication<br />Label:           X.509 Certificate for PIV Authentication<br />applicationOID:  2.16.840.1.101.3.7.2.1.1<br />Path:            0101<br />Data object read failed: File not found<br />Reading data object &lt;4&gt;<br />applicationName: Cardholder Fingerprints<br />Label:           Cardholder Fingerprints<br />applicationOID:  2.16.840.1.101.3.7.2.96.16<br />Path:            6010<br />Auth ID:         01<br />Reading data object &lt;5&gt;<br />applicationName: Printed Information<br />Label:           Printed Information<br />applicationOID:  2.16.840.1.101.3.7.2.48.1<br />Path:            3001<br />Auth ID:         01<br />Reading data object &lt;6&gt;<br />applicationName: Cardholder Facial Image<br />Label:           Cardholder Facial Image<br />applicationOID:  2.16.840.1.101.3.7.2.96.48<br />Path:            6030<br />Auth ID:         01<br />Reading data object &lt;7&gt;<br />applicationName: X.509 Certificate for Digital Signature<br />Label:           X.509 Certificate for Digital Signature<br />applicationOID:  2.16.840.1.101.3.7.2.1.0<br />Path:            0100<br />Data object read failed: File not found<br />Reading data object &lt;8&gt;<br />applicationName: X.509 Certificate for Key Management<br />Label:           X.509 Certificate for Key Management<br />applicationOID:  2.16.840.1.101.3.7.2.1.2<br />Path:            0102<br />Data object read failed: File not found<br />Reading data object &lt;9&gt;<br />applicationName: X.509 Certificate for Card Authentication<br />Label:           X.509 Certificate for Card Authentication<br />applicationOID:  2.16.840.1.101.3.7.2.5.0<br />Path:            0500<br />Data object read failed: File not found<br />Reading data object &lt;10&gt;<br />applicationName: Security Object<br />Label:           Security Object<br />applicationOID:  2.16.840.1.101.3.7.2.144.0<br />Path:            9000<br />Data object read failed: File not found<br />Reading data object &lt;11&gt;<br />applicationName: Discovery Object<br />Label:           Discovery Object<br />applicationOID:  2.16.840.1.101.3.7.2.96.80<br />Path:            6050<br />Data Object (20 bytes): &lt; 7E 12 4F 0B A0 00 00 03 08 00 00 10 00 01 00 5F 2F 02 40 00 &gt;<br />Reading data object &lt;12&gt;<br />applicationName: Cardholder Iris Image<br />Label:           Cardholder Iris Image<br />applicationOID:  2.16.840.1.101.3.7.2.16.21<br />Path:            1015<br />Data object read failed: File not found<br /></div><br /><br />piv-tool has a --admin parameter that uses a PIV_EXT_AUTH_KEY environment variable that points to a file that contains the key in hexadecimal format. However I was not supplied with they key nor documentation.<br /><br />Searching the forum and the Internet I found a reference to <!-- m --><a class="postlink" href="https://github.com/berkmanmd/yubikey-neo-osx">https://github.com/berkmanmd/yubikey-neo-osx</a><!-- m --> however it has since been removed from GitHub. Mike Berkman if you are reading this would you mind sharing the details again, please?<br /><br />There is also pki-tool in easy-rsa.<br /><br />I have not tried ./pki-tool --pkcs11-init, pkcs11-tool --init-token, nor pkcs15-init, yet as I do not want to delete/erase/wreck the applet by not supplying the correct key if it is needed.<br /><br />Can anyone clarify if the key is needed, or is only the PIN needed?<br />Some commands have prompted for a PIN, I used 123456 which worked. Same default and the OpenPGP user PIN.<br /><br />Any help will be appreciated.<br /><br />Thanks,<br />air<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2675">air</a> — Tue Jan 14, 2014 5:10 am</p><hr />
]]></content>
</entry>
</feed>