I have just successfully tested my Nitrokey Pro stick with
a OnePlus 3T mobile phone
using an USB OTG adapter cable
running LineageOS14.1 (Android 7.1.x)
K-9 Mail 5.203
OpenKeychain 4.2.4.
I can decrypt emails received with the K-9 email client.
The key problem to solve was to import a reference to the private key into OpenKeychain:
Solution: Export the “secret key” (that contains only a reference to the Nitrokey but
does not contain the private key) from a desktop computer where I have already installed
the NitrokeyPro and import that “secret key” file after plugging the Nitrokey Pro into the mobile phone.
Use “Manage my keys > Use security token > Import key file” to do this once.
A port of the Nitrokey App to Android is therefore not required - at least not for email decryption (as indicated in the wiki https://github.com/Nitrokey/wiki/wiki/Ideas#port-nitrokey-app-to-android:
“OpenKeychain is an GPG-like Android app which works with Yubikey NFC already. It should be relatively easy to extend it to work with the Nitrokey via USB.”).
Thank you, this nearly worked for me, I have Motorola Moto G3 - Nitrokey Storage - USB OTG Cable. Unfortionally the Power Supply of the phone does not seem to be enough to power the Nitrokey Storage, so this setup only works for me with a powered USB hub. I opened a new Thread at Nitrokey Storage and Open Keychain => Lack of power supply? to see if someone has an Idea to fix that.
I realized with version 4.5 it is not necessary anymore to extract the keys from another keychain. It is sufficient to have the public key at hand or uploaded on a keyserver. This make thinks much more easy. Please have a look at the instructions on our website.
thanks a lot for retesting! I am happy that this works for you as well now. So this workflow should generally work.
I think about putting a note about the signature key on the website, but as the signature subkey should be included anyway (e.g. for using NK for E-Mail and other use cases), it may would be more confusing than helpful? We’ll see.
But thank you for your detailed analysis, as this could surely help other users!