Bug 1690552
Summary: | ssh-agent stops working with certificate in alternate yubikey slot | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Orion Poplawski <orion> |
Component: | opensc | Assignee: | Jakub Jelen <jjelen> |
Status: | CLOSED NEXTRELEASE | QA Contact: | Asha Akkiangady <aakkiang> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.6 | ||
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-04-04 14:08:27 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Orion Poplawski
2019-03-19 16:37:59 UTC
The current RHEL7.6 OpenSC does not have any mechanisms to detect and resolve concurrent access to the PIV card from different applications. Actually even existence of the "magic object" (0x5FC10C) and some operation might break the login state so I really think this should be filled against opensc. To follow up from here, we actually know about this issue and it should be already resolved in the current opensc. Can you check that current master will work for you? If not, I will need some more debugging information from OpenSC. From a quick test it appears that current OpenSC master does work. Thanks! This will most probably be fixed in the next release of OpenSC in RHEL7. Please, reopen if the problems persist. |