-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ykman list -s
fails to display keys serial numbers
#594
Comments
You can see in the output: |
how can
|
Also, currently
|
ykman commands that act on a single device use the serial number of the YubiKey to determine which device target, and cannot be used on devices without a serial number, if more than one is present. If you need to perform some action on multiple keys (batch programming, etc) then scripting can be used to iterate over connected devices. |
|
It looks like you're trying to use the command for something it was not intended to do, so I fully understand that you find the UX poor for that task.
No, devices which do not have serial numbers cannot have them programmed later.
The Security Key series, with the exception of the "Security Key Enterprise Edition" do not have serial numbers. All standard YubiKey models have serial numbers.
It's something we may consider for future releases, if there is sufficient demand. However it would also need equivalent device paths for the OTP and CCID transports in addition to FIDO, as these typically show up as 3 different devices. |
master
as of e5a4f22ykman list -s
does not work.Steps to reproduce
Run:
ykman list -s
Expected result
Serial from the yubikey being displayed. There is no other documented way to list the serial numbers.
Other info
The devices are listed via https://github.com/Yubico/python-fido2. The
HIDIOCGRAWUNIQ
ioctl does not return anything.Here is the diagnostics from the two keys on the system:
The text was updated successfully, but these errors were encountered: