aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
authordrduh <github@duh.to>2025-01-01 20:09:41 +0000
committerGitHub <noreply@github.com>2025-01-01 20:09:41 +0000
commit219423db05b3ef498a55db131e4516c819acee7e (patch)
treeff4ad1d10324c23c553cf3e50dbd939f74043684
parentMerge pull request #464 from forbytten/add_uids_issue_445 (diff)
parentdocs(wsl): Add usbipd in WSL setup (diff)
downloadYubiKey-Guide-219423db05b3ef498a55db131e4516c819acee7e.tar.gz
Merge pull request #468 from jmzagorski/docs/wsl-usbipd-win-libHEADmaster
docs(wsl): Add usbipd-win in WSL setup
-rw-r--r--README.md20
1 files changed, 20 insertions, 0 deletions
diff --git a/README.md b/README.md
index 08c190a..fcd054e 100644
--- a/README.md
+++ b/README.md
@@ -1389,6 +1389,26 @@ Connect to the remote host and use `ssh-add -l` to confirm forwarding works.
Agent forwarding may be chained through multiple hosts. Follow the same [protocol](#remote-host-configuration) to configure each host.
+An alternate method is the [usbipd-win](https://github.com/dorssel/usbipd-win) library. If you encounter issues with accessing the YubiKey in WSL after configuring usbipd-win, you may need to add custom polkit rules to ensure proper permissions for the pcscd service. Here's an example configuration using a scard group (the group logic is optional):
+
+Create a new rule file at /etc/polkit-1/rules.d/99-pcscd.rules:
+
+```bash
+polkit.addRule(function(action, subject) {
+ if (action.id == "org.debian.pcsc-lite.access_card" &&
+ subject.isInGroup("scard")) {
+ return polkit.Result.YES;
+ }
+});
+
+polkit.addRule(function(action, subject) {
+ if (action.id == "org.debian.pcsc-lite.access_pcsc" &&
+ subject.isInGroup("scard")) {
+ return polkit.Result.YES;
+ }
+});
+```
+
### Replace agents
To launch `gpg-agent` for use by SSH, use the `gpg-connect-agent /bye` or `gpgconf --launch gpg-agent` commands.