-
-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pamu2fcfg -> error: fido_cred_verify (-7) FIDO_ERR_INVALID_ARGUMENT #54
Comments
Is the second snippet using Pico Fido or Yubikey? |
The snippets - I shared in the posting - are done using the Pico Fido. |
Cool, this fixed the same issue for me. Thanks! |
Might be related with #91. Try latest nightly development build. |
I had given it a try and build it from scratch using Pico SDK 2.1.0 . Hopefully I took the latest version (nightly source?), by using
Situation is unchanged ... still getting the same error ... never mind ... PS: Where do I find these? |
I see the problem. The thing is that pamu2f does not send the PIN to the authenticator and thus, when you try to log in and get the assertion, it is rejected due to the missing PIN. For instance, if you try with a fresh firmware without a set PIN, it will work. No PIN is sent, but no PIN is set, so it works. But when you use a PIN, the keys are encrypted with a hash of that PIN. Therefore, you must provide it beforehand to be able to log in. The solution is to add |
I do have added the "pinverification=1", but the situation is unchanged. Tested with the firmware from 2 days back. Pico with freshly installed firmware
Same Pico, after PIN set (
===
|
I would like to share this error with those of you, who run into the same issue.
After "fixing" this error, I am now able to login without a password ... using the Pico Fido - Pico Keys. A big thanks to those people which made/make this possible.
Summary: There is a difference in the implementation of the pamu2fcfg tool between version "pam_u2f 1.1.0" and "pamu2fcfg 1.3.0". The older version causes the error with Pico Fido.
Even though the pamu2fcfg is working fine with a YubiKey, with the Pico Fido2 it might be failing.
At least, that's what I had observed with pamu2fcfg on my on Debian 12 (bookworm) system.
The version from SID is the newest of pamu2fcfg, however comes with two additional new dependencies. So ... I build my own version and in result had been able to retrieve the data required to configure the pam-fido2 process. To be clear, I was only using pamu2fcfg (Version 1.3.0) to retrieving the data from the token.
The text was updated successfully, but these errors were encountered: