-
-
Notifications
You must be signed in to change notification settings - Fork 277
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Solo verify gives InvalidSignature #137
Comments
I understand you are using a Solo Hacker. Could it be that you mixed flashing secure and hacker builds? TLDR: Try running In more detail, I suspect two things have happened:
We should probably handle this case in |
I tired that already:
Afterwards the key is stuck in the bootloader (yellow flashing). Only the signed firmwares can be flashed successfully. Every firmware I tried to build myself errors out with |
Can you try the web update? |
If still not working, perhaps send [email protected] and link here, and we can send you a new (working) device. |
OK, call me confused. I've updated to 2.1.0, and did some more investigating, as the key wasn't accepted by any major provider, nor by the Yubikey test page. So I looked for a page which gave me some debugging output and found https://webauthn.org/. First, I tested Firefox. It allows me to anonymize the data sent to the server. Interestingly choosing different options here leads to different results (Full outputs at https://gist.github.com/Mirclus/c127f037adef3b30f5235f30ceb028e4): If I enable anonymization in Firefox, the key seems to work. If I disable it, the key gets rejected with "U2F attestation signature verification failed". In Chrome, I cannot get it to work at all. If I allow access to private data, it gets denied, and if I block this access, the whole process gets aborted. I'm not sure what information Firefox strips off, but that seems to be the problem. If you need more testing, just say so. Thank you for the offer, I'll get in touch, |
I'm thinking the attestation key in the device is incorrect somehow. I believe the anonymization feature removes the attestation information so it works. You might be able to fix it by running these commands:
edit: probably will not work since your bootloader is checking for signatures :/ |
Unfortunately, I can't get into DFU. |
I have a similar problem. I started with bundle-hacker-2.2.0.hex on NUCLEO-L432KC board. Then I compiled version 2.2.2 and updated firmware. At that point all worked fine. I successfuly added 2nd factor auth to google account, register and auth on demo.yubico.com. Also |
My Solo does not work with any website and
solo key verify
gives anInvalidSignature
error (full output). I already tried reseting the keys and all 3 signed firmwares (1.1.0, 1.1.1 and 2.0.0).This was tested on Arch Linux (Kernel 5.0.0) with Python 3.7.2
More details:
After receiving my Solo Hacker, I started trying some stuff. Unfortunately, I hit bug #50, didn't check the issue tracker and ended up with a locked bootloader (
solo program aux bootloader-version
gives version1.0.0.
) and a broken firmware.After leaving it lying around for some time, I tried flashing the signed firmware (1.1.0). The key booted a firmware again, but I had the issues above. I then updated to 1.1.1 and had the same issues. Same story with 2.0.0 today.
Is there any way to recover the Solo or is it gone for good?
The text was updated successfully, but these errors were encountered: