-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
USB Hotplug Detection and TouchID lid close fix #10092
Conversation
37e9546
to
d5893ec
Compare
This is great, we can also implement an option to auto lock the database when the yubikey is unplugged. The downside to that is if you have pending changes to save, you'll have to plug your key back in. |
37d333d
to
07a35e1
Compare
07a35e1
to
a19408c
Compare
Windows implementation added. This should be ready for review. |
de2c066
to
a5d50f4
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## develop #10092 +/- ##
===========================================
+ Coverage 63.80% 63.94% +0.14%
===========================================
Files 355 358 +3
Lines 43298 43375 +77
===========================================
+ Hits 27625 27736 +111
+ Misses 15673 15639 -34 ☔ View full report in Codecov by Sentry. |
559bc7c
to
8cb4384
Compare
8cb4384
to
d7068dc
Compare
f358512
to
1b2b745
Compare
df8a90d
to
17b00b7
Compare
17b00b7
to
42a9c3a
Compare
That happens all the time if you have any account that allows to register only 1 OTP key (Paypal... to name a few), but one owns multiple keys (which you should). |
Release 2.7.7 - Support USB Hotplug for Hardware Key interface [keepassxreboot#10092] - Support 1PUX and Bitwarden import [keepassxreboot#9815] - Browser: Add support for PassKeys [keepassxreboot#8825, keepassxreboot#9987, keepassxreboot#10318] - Build System: Move to vcpkg manifest mode [keepassxreboot#10088] - Fix multiple TOTP issues [keepassxreboot#9874] - Fix focus loss on save when the editor is not visible anymore [keepassxreboot#10075] - Fix visual when removing entry from history [keepassxreboot#9947] - Fix first entry is not selected when a search is performed [keepassxreboot#9868] - Prevent scrollbars on entry drag/drop [keepassxreboot#9747] - Prevent duplicate characters in "Also choose from" field of password generator [keepassxreboot#9803] - Security: Prevent byte-by-byte and attachment inference side channel attacks [keepassxreboot#10266] - Browser: Fix raising Update Entry messagebox [keepassxreboot#9853] - Browser: Fix bugs when returning credentials [keepassxreboot#9136] - Browser: Fix crash on database open from browser [keepassxreboot#9939] - Browser: Fix support for referenced URL fields [keepassxreboot#8788] - MacOS: Fix crash when changing highlight/accent color [keepassxreboot#10348] - MacOS: Fix TouchID appearing even though lid is closed [keepassxreboot#10092] - Windows: Fix terminating KeePassXC processes with MSI installer [keepassxreboot#9822] - FdoSecrets: Fix database merge crash when enabled [keepassxreboot#10136] # -----BEGIN PGP SIGNATURE----- # # iQEzBAABCAAdFiEENIkEDB8MPuq41ValRA/GXy4MbgEFAmXs7VsACgkQRA/GXy4M # bgHLpwf/brnyPPs3gJxZmD2pn8542D4CCsDh0fTceurOtqCe3J4Y+Fftc5euuoQu # 6rP4vJdd586l7JX5FnYIPXvGiU9op3MudJh+y+RN/PWwKcXNIXfUItMhpZEka49n # xnw+Wvbilg1QIHSSmZdIjBpohnEkA67qhWauc3bCacrRyEvIOzVMTxnqDTe4GUDy # CyauaRMMKezRTpLxSsk63TDAZZgDwK4ci5lC6ysHekc1Za6IbI3fMFjz1BGj+kPU # tMHMfDCWqK/5JZ27ZWcxy7m8tJY9m3rb+MoCyFRQz9ixaEe29yf5NqYdm9sn1Dlh # O7aFi7/EJtsBlXdguw5BcTPbsL7XEQ== # =Cots # -----END PGP SIGNATURE----- # gpg: directory '/home/runner/.gnupg' created # gpg: keybox '/home/runner/.gnupg/pubring.kbx' created # gpg: Signature made Sat Mar 9 23:14:35 2024 UTC # gpg: using RSA key 3489040C1F0C3EEAB8D556A5440FC65F2E0C6E01 # gpg: Can't check signature: No public key
You should have multiple keys for backup purposes, but there is no point in having them plugged in at the same time, unless perhaps you have one for work and another personal key. If you are just too paranoid to use the same key for different services, then you also shouldn't have them with you at the same time. But anyway. You can have two plugged in if you need to. |
When you have a Yubikey with two slots (e.g. a Neo) ... By the way, I struggled a little bit with this new feature and it seems that the key is not detected correctly right upon insertion: my 2015 Yubikey Neo still works like a charm, but its getting old and now needs some time to wake up, so I'm not sure this is worth filing a bug report. The trick is to check the serial number: a 'refresh' is needed when it's only 2 or 3 digits instead of the 7 digits I expect, not a big deal, just paying attention when unlocking the database... |
Which YubiKey do you have? |
Hello, I have a Yubikey NEO, I bought it in something like 2015. Firmware version is 3.4.9, if that may help, but as I said, I'm used to have to wait a few seconds for it to initialize when plugged-in (TOTP over NFC on Android also takes a few seconds to load the codes). I have kept slot 1 for Yubico OTP (with a custom keypair used for VPN connection), and slot 2 with challenge-response for KeepassXC, on top of the TOTP feature for several other accounts. [Edit] Syntax fixing. |
The NEO keys were garbage, they have to be handled specially because they don't comply with yubikeys spec. |
I have a spare NEO as well and tested it with the change. For me, it worked totally fine. What OS are you on? |
Hello, Thank you for following up on my comment, I'm on Windows and I reproduce this delay on both Windows 11 (23H2) and Windows 10 (21H2). However, I agree with Neo 'randomness': each manufacturing year behaves differently, and this is why I don't believe it's worth spending time on this. I managed to adapt to my NEO specialties , my friends who are using some did the same, and when the replacement time will come, I'll perform a more thorough review... Thanks ! |
This is a great feature for convenience, however it's not automatically detecting new keys. On Linux (Guix), on the unlock screen, I'm only seeing new hardware keys I insert after I exit to the main page and go back to the unlock screen. On the terminal I'm getting:
I performed an strace, but I couldn't determine which access it was. Nothing related to udev, dev, sys, pam, or usb stood out as being the culpret. As expected running keepassxc as root, resolves the issue. I've attached both straces for running under The operating system is Guix Linux at a8353e9d6b34fd8d42d2e8f14ce844849fe9c293. Let me know if you need any more information. |
You need the yubikey udev rules installed. Never heard of guix though. https://github.com/Yubico/yubikey-personalization/blob/master/70-yubikey.rules |
KeePassXC now automatically detects hotplugged USB devices, so users don't have to manually refresh the YubiKey list anymore.
Also fixes TouchID not being available after lid close (fixes #8945 and #10315)
Type of change