I installed Debian 12 on a VM because the ONLYKEY app runs on it, so I tried Firefox and Chrome there. Both are native installs (i.e. not flatpak). The app finds the key, as does lsusb. After the firmware update on the key, I get error messages on journalctl -f for Chrome.
In all cases the key does not give a blue light, hence no indication a button should be pushed, and pushing a button anyway does nothing.
Firefox is native on both D12 and F40, and behaves as before, with the dialog box appearing then a moment later disappearing. There is an error message:
"
There was a problem.
Try using your security key again or try another way to verify it’s you
"
There is nothing output on the console. Logging information is very general about socket traffic. There is nothing written to the journal.
Chrome is more informative after the firmware update. The results are the same for D12 native, and F40 flatpack. The key dialog appears and does not go away (unlike for FF) as though it is waiting. It hangs there (unlike FF).
This is the journalctl output:
journalctl:
Chrome installed directly Debian 12:
Jul 21 02:22:42 M1 google-chrome.desktop[3808]:
[3801:3801:0721/022242.798829:ERROR:device_event_log_impl.cc(196)]
[02:22:42.798] FIDO: get_assertion_request_handler.cc:767 Ignoring status 50
from usb-1d50:60fc
Chrome flatback F40:
Jul 21 09:43:15 Vivobook12 kernel: usb 1-3: new full-speed USB device number 39 using xhci_hcd
Jul 21 09:43:15 Vivobook12 kernel: usb 1-3: New USB device found, idVendor=1d50, idProduct=60fc, bcdDevice= 1.00
Jul 21 09:43:15 Vivobook12 kernel: usb 1-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 21 09:43:15 Vivobook12 kernel: usb 1-3: Product: ONLYKEY
Jul 21 09:43:15 Vivobook12 kernel: usb 1-3: Manufacturer: CRYPTOTRUST
Jul 21 09:43:15 Vivobook12 kernel: usb 1-3: SerialNumber: 1000000000
Jul 21 09:43:15 Vivobook12 kernel: input: CRYPTOTRUST ONLYKEY as /devices/pci0000:00/0000:00:08.1/0000:04:00.3/usb1/1-3/1-3:1.0/0003:1D50:60FC.0052/input/input37
Jul 21 09:43:15 Vivobook12 kernel: hid-generic 0003:1D50:60FC.0052: input,hidraw3: USB HID v1.11 Keyboard [CRYPTOTRUST ONLYKEY] on usb-0000:04:00.3-3/input0
Jul 21 09:43:15 Vivobook12 kernel: hid-generic 0003:1D50:60FC.0053: hiddev96,hidraw4: USB HID v1.11 Device [CRYPTOTRUST ONLYKEY] on usb-0000:04:00.3-3/input1
Jul 21 09:43:15 Vivobook12 kernel: hid-generic 0003:1D50:60FC.0054: hiddev97,hidraw5: USB HID v1.11 Device [CRYPTOTRUST ONLYKEY] on usb-0000:04:00.3-3/input2
Jul 21 09:43:15 Vivobook12 mtp-probe[28609]: checking bus 1, device 39: "/sys/devices/pci0000:00/0000:00:08.1/0000:04:00.3/usb1/1-3"
Jul 21 09:43:15 Vivobook12 mtp-probe[28609]: bus: 1, device: 39 was not an MTP device
Jul 21 09:43:15 Vivobook12 systemd-logind[1048]: Watching system buttons on /dev/input/event7 (CRYPTOTRUST ONLYKEY)
Jul 21 09:43:15 Vivobook12 mtp-probe[28624]: checking bus 1, device 39: "/sys/devices/pci0000:00/0000:00:08.1/0000:04:00.3/usb1/1-3"
Jul 21 09:43:15 Vivobook12 mtp-probe[28624]: bus: 1, device: 39 was not an MTP device
Jul 21 09:44:11 Vivobook12 com.google.Chrome.desktop[28095]: [2:2:0721/174411.809606:ERROR:device_event_log_impl.cc(196)] [17:44:11.809] FIDO: get_assertion_request_handler.cc:767 Ignoring status 50 from usb-1d50:60fc
after try again:
Jul 21 09:46:43 Vivobook12 com.google.Chrome.desktop[28095]: [2:2:0721/174643.612334:ERROR:device_event_log_impl.cc(196)] [17:46:43.612] FIDO: get_assertion_request_handler.cc:767 Ignoring status 50 from usb-1d50:60fc
I have not yet passed the key through to flatpak, but I am trying to figure it out now, and will report back.
Yes I tried Chromium on F40 yesterday, and it did not query the key either.