From owner-freebsd-stable@freebsd.org Wed Sep 5 04:04:13 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1CDF4FE1F1E for ; Wed, 5 Sep 2018 04:04:13 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ipmailnode02.adl6.internode.on.net (ipmailnode02.adl6.internode.on.net [150.101.137.148]) by mx1.freebsd.org (Postfix) with ESMTP id E4ED38F7ED for ; Wed, 5 Sep 2018 04:04:11 +0000 (UTC) (envelope-from darius@dons.net.au) Received: from ppp118-210-0-86.bras1.adl4.internode.on.net (HELO midget.dons.net.au) ([118.210.0.86]) by ipmail02.adl6.internode.on.net with ESMTP; 05 Sep 2018 13:28:50 +0930 Received: from midget.dons.net.au (localhost [127.0.0.1]) by midget.dons.net.au (8.15.2/8.15.2) with ESMTPS id w853wf46079220 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for ; Wed, 5 Sep 2018 13:28:46 +0930 (ACST) (envelope-from darius@dons.net.au) Received: (from mailnull@localhost) by midget.dons.net.au (8.15.2/8.15.2/Submit) id w853UMVQ062303 for ; Wed, 5 Sep 2018 13:00:22 +0930 (ACST) (envelope-from darius@dons.net.au) X-Authentication-Warning: midget.dons.net.au: mailnull set sender to using -f Received: from maelstrom.gsoft.com.au (Maelstrom.gsoft.com.au [203.31.81.59]) by ppp118-210-0-86.bras1.adl4.internode.on.net (envelope-sender ) (MIMEDefang) with ESMTP id w853UMfN062296; Wed, 05 Sep 2018 13:00:22 +0930 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Subject: Re: Yubico Security Keys From: "O'Connor, Daniel" In-Reply-To: Date: Wed, 5 Sep 2018 13:00:20 +0930 Cc: "freebsd-stable@freebsd.org" Content-Transfer-Encoding: quoted-printable Message-Id: <7DA3F074-12CF-43C4-A514-19651112EE42@dons.net.au> References: <1AEEDB86-DF6B-433B-A413-452F105D9A53@dons.net.au> To: Robert Ames X-Mailer: Apple Mail (2.3445.9.1) X-Spam-Score: 0 () No, score=0.0 required=5.0 tests=none autolearn=unavailable autolearn_force=no version=3.4.1 X-Scanned-By: MIMEDefang 2.83 on 10.0.2.1 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Sep 2018 04:04:13 -0000 > On 5 Sep 2018, at 12:43, Robert Ames wrote: >>> On 5 Sep 2018, at 08:33, Robert Ames wrote: >>> FreeBSD sees the device: >>>=20 >>> Sep 4 17:25:13 freebsd kernel: ugen1.4: at usbus1 >>> Sep 4 17:25:13 freebsd kernel: uhid0 on uhub4 >>> Sep 4 17:25:13 freebsd kernel: uhid0: on usbus1 >>>=20 >>> So should this just work out of the box or is there something I'm >>> missing? >>=20 >> Hi Robert, >> I don't have any Yubikeys but have you tried checking the permissions = of /dev/uhid0* and /dev/ugen1.4 (which will be a symlink to usb/1.4.0) ? >> You can chmod them for now and then if that works have a devd conf or = devfs rule which sets the permissions appropriately when the device is = connected. >>=20 >> If permissions are the problem it would be nice to see if the error = message can be improved too :) >>=20 >> -- >> Daniel O'Connor >=20 > I had done a manual chmod 777 /dev/usb/1.4.0 but had overlooked = /dev/uhid0. > Once I did a chmod 777 on that it worked. Thank you. Any suggestions = on the > best way to add a devd conf or devfs rule for this thing? Add this to /etc/devfs.conf.. [root=3D100] add path 'uhid*' group users mode 660 (Assuming your user is in the 'users' group - adjust to taste, devfs(8) = has the details) And this to /etc/rc.conf.. devfs_system_ruleset=3D"root" Then do.. sudo service devfs restart And unplug/replug the key. -- Daniel O'Connor "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum