rsyk...@disroot.org writes:

> Fabio Martins <fosf...@gmail.com> wrote:
>> About your question, I believe you need to do a tail -f /var/log/messages
>
> this is what I see after pluging the key in the computer:
>
> Apr  7 19:02:06 odin /bsd: uhidev1 at uhub0 port 1 configuration 1 interface 
> 1 "GoTrust Idem Key" rev 2.00/1.11 addr 2
> Apr  7 19:02:06 odin /bsd: uhidev1: iclass 3/0
> Apr  7 19:02:06 odin /bsd: fido0 at uhidev1: input=64, output=64, feature=0
> Apr  7 19:02:06 odin /bsd: uhidev2 at uhub0 port 1 configuration 1 interface 
> 2 "GoTrust Idem Key" rev 2.00/1.11 addr 2
> Apr  7 19:02:06 odin /bsd: uhidev2: iclass 3/1
> Apr  7 19:02:06 odin /bsd: ukbd0 at uhidev2: 8 variable keys, 6 key codes
> Apr  7 19:02:06 odin /bsd: wskbd1 at ukbd0 mux 1
> Apr  7 19:02:06 odin /bsd: wskbd1: connecting to wsdisplay0
> Apr  7 19:02:06 odin /bsd: ugen0 at uhub0 port 1 configuration 1 "GoTrust 
> Idem Key" rev 2.00/1.11 addr 2

This is a good start of debugging effort. We can tell that the kernel is
happy enough with your device. Now you can go one step further and see
if ssh can use it.

If you are feeling ambitious about debugging this for chrome, try
running it with --enable-logging --v=1 and then look into
~/.config/chromium/chrome_debug.log for anything matching "fido".

You can then do the same on Linux and compare the outputs.

How much do you care about having this extra pin protection? I have been
using a few older FIDO devices for years now, so we know this much
works.

Thanks
Greg

Reply via email to