Open j-baker opened 2 years ago
it's worth noting that I've been using this for the last 18 months with no issues. Great software, love it!
Hm that's odd. Just to cover bases, try rebooting yet? Not ideal but sometimes macOS gets a bit confused and launchd starts having issues.
Just to add nother data point: I am seeing this as well. 10 minutes ago it worked just fine, I went away to grab a coffee and now it shows me the same error message. I'll reboot now and see if that fixes it. Stopping and starting the service via launchd (which usually resolves most of my issues with this amazing application) doesn't do it this time.
EDIT: After a reboot it works again :|
This happened to me as well :(
Btw how do I restart it? I did not find the daemon with launchctl list
Any way to troubleshoot this further @maxgoedjen ? I'm hitting this issue on both of my test machines, one MacBook Air 2022 and one Mac Mini 2020, both running macOS 14.1 (23B74) + Secretive 2.3.1. I've rebooted both multiple times and confirm that the Agent is running.
Here's an example host override in my ~/.ssh/ssh_config
#test securehost
Host 20.30.40.50
User root
ControlPath none
IdentitiesOnly yes
IdentityAgent ~/Library/Containers/com.maxgoedjen.Secretive.SecretAgent/Data/socket.ssh
IdentityFile none
PasswordAuthentication no
Executing the following test command results in an error message.
$ ssh -vvv 20.30.40.50 |& grep ssh_agent
debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation
I see this error with -vv
, too, but it seems benign in my case. I have a different problem, where attempting to override the IdentityAgent
in a Host
section for GitHub doesn't switch to Secretive's agent, instead continuing to use my default 1Password agent. That's a SSH issue, though.
I figured I'd try again with v2.4.0
I got it to work 🚀 — realized I had to specify an IdentityFile
in my ~/.ssh/config
file (specifying only the IdentityAgent
is not enough).
Now, my question is how to properly store these keys on my 2 different Macs... I don't see any way to export or import keys to the secure enclave. The FAQ says it can't be done. It becomes a bit unweildy to have to copy 2-3 public keys to every host I manage. Wonder if anyone has any tips about that.
@luckman212 It is not possible to export a key from the Secure Enclave. They are hardware-bound.
I see. Am I missing something the about the utility of this system? What is the correct method for ensuring you don't get locked out of a critical system should you lose access to that one specific Mac? (lost, stolen, broken etc)
Or is this simply to supplement an existing disk-based key as an alternate/convenience method?
In a model such as this, you'd be expected to have two different keys and set up trust for both of them. In some cases this is trivial (e.g. GitHub making it easy to support multiple SSH keys). In other cases it may be harder.
There are advantages of this model (namely one needn't worry about a software vulnerability causing the key to be shared). The disadvantage is that key management becomes somewhat harder.
If you would like to share your SSH key easily between devices, I could recommend either the 1Password support (although this does not keep the key solely in hardware), or Yubikey's support for loading in externally generated keys (as GPG keys, which can be used for SSH).
I'm facing an issue where Git sporadically refuses to sign a commit with secretive, but trying 1..2 times will work.
per faq, filing issue with log. Seems git is struggling to connect to the ssh agent - have tried restarting SecretAgent a couple of times but no success.