pamu2fcfg -> error: fido_cred_verify (-7) FIDO_ERR_INVALID_ARGUMENT #54
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I would like to share this error with those of you, who run into the same issue.
After "fixing" this error, I am now able to login without a password ... using the Pico Fido - Pico Keys. A big thanks to those people which made/make this possible.
Summary: There is a difference in the implementation of the pamu2fcfg tool between version "pam_u2f 1.1.0" and "pamu2fcfg 1.3.0". The older version causes the error with Pico Fido.
Even though the pamu2fcfg is working fine with a YubiKey, with the Pico Fido2 it might be failing.
At least, that's what I had observed with pamu2fcfg on my on Debian 12 (bookworm) system.
The version from SID is the newest of pamu2fcfg, however comes with two additional new dependencies. So ... I build my own version and in result had been able to retrieve the data required to configure the pam-fido2 process. To be clear, I was only using pamu2fcfg (Version 1.3.0) to retrieving the data from the token.
Is the second snippet using Pico Fido or Yubikey?
The snippets - I shared in the posting - are done using the Pico Fido.
Cool, this fixed the same issue for me. Thanks!
Might be related with #91. Try latest nightly development build.
I had given it a try and build it from scratch using Pico SDK 2.1.0 .
Hopefully I took the latest version (nightly source?), by using
Situation is unchanged ... still getting the same error ... never mind ...
PS: Where do I find these?
I see the problem.
The thing is that pamu2f does not send the PIN to the authenticator and thus, when you try to log in and get the assertion, it is rejected due to the missing PIN.
For instance, if you try with a fresh firmware without a set PIN, it will work. No PIN is sent, but no PIN is set, so it works. But when you use a PIN, the keys are encrypted with a hash of that PIN. Therefore, you must provide it beforehand to be able to log in.
The solution is to add
pinverification=1to your /etc/pam.d/ file. Do not forget topamu2cfgagain.I do have added the "pinverification=1", but the situation is unchanged.
Tested with the firmware from 2 days back.
Pico with freshly installed firmware
Same Pico, after PIN set (
fido2-token -S /dev/hidraw?)===
/etc/pam.d/common-aut===Hola yo e intentado usarla para pam_u2f y si e podido hacerlo funcionar solamente que cuando desconecto la Pico FIDO tengo que configurar de nuevo como si se borrara o fuera otra lleve en los dos modos que tiene pamu2fcfg -r para hacer el passkey como lo hacen en las web que hay si funciona e incluso la puedo borrar y agregar de nuevo tengo picokey app con licencia
y tuve ese fallo es el tiempo de presionar del botón esta en 0 y no da tiempo de pisarlo