-
-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to create key when age-yubikey-plug has created key on yubikey #139
Comments
In my case, the error looks like that:
Is it the same for you? |
@FiloSottile / @str4d Is there any way to workaround this limitation? Or a way to manually generate a correct key? Thanks for your help! |
I tried this this morning, and I get exactly the same error, I also have some Age keys on the YubiKey. I think it would be a nice feature to bypass the creation of new PIN and PUK and supply them with your own. I think I found a workaround by manually (as suggested here) generating a key and certificate in slot 9a (which happens in setup.go) with ykman, (but I am by no means an expert in this).
I verified that this works with Github by setting the key there, and using the I hope this helps! Let me know if you face any challenges. |
Dear @bcvanmeurs , Thanks for helping out! Your guide worked for me as well and I am able to log in to other hosts via ssh successfully. One remark: In my version of I'm happy to provide a PR to extend the docs with the guide above, if @FiloSottile is interested in this. |
Hi @mutlusun , Are you using a recent version of ykman? I used ykman version 5.1.0 and checked the |
Oh I see now that it is also mentioned in the release notes of version 5.1.0, released on April 17th.
https://github.com/Yubico/yubikey-manager/releases/tag/5.1.0 |
Dear @bcvanmeurs , |
Just sharing another workaround for this issue. I reset my yubikey back to the default PIN/PUK & Management Key. As per the instructions in the error message.
Despite not knowing what I was doing I tried it anyway. The defaults are here: There are 3 commands, each will prompt you to enter the values. # Change this to 123456
ykman piv access change-pin
# Change this to 12345678
ykman piv access change-puk
# Change this to 010203040506070801020304050607080102030405060708
ykman piv access change-management-key After this you can run the setup in this project as per the documentation. Changing your PIN & PUK back to your previous non-default value. The management key is also updated to be protected by the PIN during setup. |
@bcvanmeurs
by default, it will only be valid for one year. idk if this really matters for SSH keys, but you can add the
Also, once you've generated it you should just be able to use |
When I have created an age encryption key on yubikey with the age-yubikey-plugin and try to use yubikey-agent it says that the card is already configured and that I’ll need to use wipe flag which results in that everything is wiped so the age encryption key is gone
The text was updated successfully, but these errors were encountered: