-
-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Making use of u2f #3583
Comments
My guess at this point is that either pyu2f doesn't support EC keys or some changes to https://github.com/pyca/cryptography cause this incompatibility. You may be able to get around it by not using EC keys ( |
Do you know how/where/why I'm using a blue Yubikey (basically, my original one before the v4/v5 ones were purchased) which I could 'reset' if somehow I caused this "_EllipticCurvePublicKey" aspect to come into play with it. My 'daily driver' v5NFC key uses [ed|cv]25519 CSEA items, but I'm not using that one with Xpra. I branched and built some updated versions of cryptography (37.0.4 [vs. 37.0.2]) and pyu2f (w/ the "latest" commits up to 20211122):
But there's not a noticable change in client/server output. Could it be a python310 issue? Thanks for getting back to me :-) |
This is beyond my expertise. A quick search can only find:
Unlikely. I am going to close this because I don't think there's much more we can do from xpra's side. |
I've opened an issue on pyca/cryptography. Thanks again :) |
The commit above should fix it - please let me know if that works. |
I haven't done a rebuild since [I believe] June 21st, looks like I've had to:
Just want to be sure I'm not goofing something else up (for myself and other openSUSE users) chasing down using a Yubikey :P That's what I've done at least, & I'd like to report that I was able to use the blue Yubikey to make a successful connection now :) |
I am getting this happening, the tray menu not working; seems to be independent of Yubikeys/u2f, etc. I've tried via a standard ssh startup
Server:
Client:
|
That was already fixed earlier in 78867e7
Oops. I thought I had done a rebuild recently - but clearly not!
That's for git master, but you could also run the latest stable version and patch the u2f authentication module there. |
I'm tied to the reproducible builds scenario via OBS - which I like, if that sounds like a complaint :) - so I use those mechanisms to pull down the latest git (including Was using 63e6b61 for what I'd posted last, when getting that problem. Now using bb4e616 and the build reports:
So I added it back to the As far as the menu aspect goes, getting the same "menu is not available yet". |
Going back to 20220621's 872c7f8 then adjusting |
Correct, that's what bb4e616 fixed - sorry, it was not clear.
It could be f45ee56 which now blocks the threaded initialization waiting for |
My work laptop has an Intel and Nvidia card in it, should be defaulting to Nvidia; at least So I'm generally using this setup: Client:
Server:
|
It's starting to look like 4ef353a is the last commit the fully works for me. I start getting random build failures ( outside of new files coming in or others going away, standard fare there :) ). I have a little list of hashes ~ some of which build, but need LAST GOOD NON-WORKING menu BUILD FAILS |
Unless I'm not comprehending your suggestion in the quote (very possible!), if I use a build of ff53b3f (which is the commit right before f45ee56) the menu doesn't work. I also built 6b84ef9 and ... everything works fine ;)
|
I meant reverting that commit on top of git head to see if that was the problem, but since everything is working again then it wasn't this one anyway - some other commit, we may never know which one. |
Describe the bug
I happened upon #1789 and would like to make use of the facility. I have a few Yubikeys; a blue one as well as, I believe, a v4NEO and v5NFC (I can never remember :P), but something like 3-5 total. I make use of the v4 for OTPs and the v5 along with GPG for encrypting,signing and ssh authentication. Nothing too fancy and I'm not claiming to have an overly deep understanding of the guts of Yubikeys or their functions, etc.
The error:
To Reproduce
Steps to reproduce the behavior:
xpra start --start="xterm" --bind-tcp=0.0.0.0:10000 --tcp-auth=u2f -d auth
xpra attach tcp://192.168.0.105:10000 -d auth
attach
). I have~/.config/xpra/u2f-pub.hex
on the destination host and~/.config/xpra/u2f-keyhandle.hex,u2f-pub.hex
on the client where the Yubikey is plugged in. I ranpython3 /usr/lib64/python3.10/site-packages/xpra/client/gtk_base/u2f_tool.py
to accomplish that.System Information (please complete the following information):
openSUSE Tumbleweed (20220714)
openSUSE Tumbleweed (20220714)
xpra-4.4+git20220621.872c7f8d8
xpra-4.4+git20220621.872c7f8d8
About reports:
Additional context
I don't know if I'm missing some python modules, I started picking through the ones listed in the build section and I feel that I have most/all installed. I have the client/server logs and will attach them if this doesn't appear to be good ole fashioned 'user error'.
The text was updated successfully, but these errors were encountered: