Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Windows client refuses to login with organization ssh-key #13153

Open
1 task done
kaasszje opened this issue Jan 30, 2025 · 2 comments
Open
1 task done

Windows client refuses to login with organization ssh-key #13153

kaasszje opened this issue Jan 30, 2025 · 2 comments
Labels
bug desktop Desktop Application

Comments

@kaasszje
Copy link

Steps To Reproduce

I'm using the windows bitwarden client (version 2025.1.3)
I create a new ssh-key, copy the public key to my server.

When I login with this key this works.
I authorize the use of the key and get logged in.

After this I logout, move the key to my organization.
Sync the client, ssh-add -l shows the key.
Now when I try to log in, I get the authorize prompt again.
But when I click on authorize, the cli gives this message:
sign_and_send_pubkey: signing failed for ED25519 "Bitwarden-test" from agent: agent refused operation

Expected Result

Expected result was a succesful login.

Actual Result

Actual result: sign_and_send_pubkey: signing failed for ED25519 "Bitwarden-test" from agent: agent refused operation
And I'm not logged in, but get a disconnect

Screenshots or Videos

Image

Additional Context

No response

Operating System

Windows

Operating System Version

Windows Server 2022

Installation method

Direct Download (from bitwarden.com)

Build Version

2025.1.3

Issue Tracking Info

  • I understand that work is tracked outside of GitHub. A PR will be linked to this issue should one be opened to address it, but Bitwarden doesn't use fields like "assigned", "milestone", or "project" to track progress.
@kaasszje kaasszje added bug desktop Desktop Application labels Jan 30, 2025
@bitwarden-bot
Copy link

Thank you for reporting this issue! We've added this to our internal tracking system.
ID: PM-17746

@cksapp
Copy link

cksapp commented Jan 31, 2025

Just commented on #13164 based on this similar concern.

Afaik this is intentionally set at this time to prevent SSH keys stored on collections.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug desktop Desktop Application
Projects
None yet
Development

No branches or pull requests

3 participants