trustcrypto/onlykey-agent

Challenge delay

Closed this issue · 2 comments

Hi,
when i perform a connection with only-key agent a 2 minutes delay occurs before it ask me to do the challenge.
I'm on an update manjaro.
The verbose loggin is the following:

2022-11-06 11:55:40,928 DEBUG Setting skey slot = 132 [onlykey.py:58]
2022-11-06 11:55:40,928 DEBUG parsed identity: {'proto': None, 'user': 'ocean', 'host': '10.1.1.250', 'port': '22222', 'path': None} [interface.py:30]
2022-11-06 11:55:40,928 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]
2022-11-06 11:56:04,083 DEBUG connected [client.py:246]
2022-11-06 11:56:04,083 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:04,083 DEBUG msg=OKSETTIME [client.py:304]
2022-11-06 11:56:04,083 DEBUG payload=[99, 103, 146, 196] [client.py:328]
2022-11-06 11:56:04,083 DEBUG sending message [client.py:341]
2022-11-06 11:56:04,104 DEBUG read="UNLOCKEDv2.1.2-prodc" [client.py:398]
2022-11-06 11:56:04,104 DEBUG outstring="bytearray(b'UNLOCKEDv2.1.2-prodc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:04,104 INFO Requesting public key from key slot =132 [onlykey.py:134]
2022-11-06 11:56:04,105 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,105 DEBUG "ssh://ocean@10.1.1.250:22222|ed25519" getting public key (ed25519) from OnlyKey [onlykey.py:136]
2022-11-06 11:56:04,105 INFO Identity to hash =b'ocean@10.1.1.250' [onlykey.py:148]
2022-11-06 11:56:04,105 INFO Identity hash =5a63b52fd28b9e62f8a7331f613ee547d4105418e4a1adb81d1ba65bac06345e [onlykey.py:152]
2022-11-06 11:56:04,105 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:04,105 DEBUG msg=OKGETPUBKEY [client.py:304]
2022-11-06 11:56:04,105 DEBUG slot_id=132 [client.py:309]
2022-11-06 11:56:04,105 DEBUG payload="015a63b52fd28b9e62f8a7331f613ee547d4105418e4a1adb80d1bc65bac06345e" [client.py:322]
2022-11-06 11:56:04,105 DEBUG sending message [client.py:341]
2022-11-06 11:56:04,105 INFO curve name= 'ed25519' [onlykey.py:168]
2022-11-06 11:56:04,206 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,206 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,306 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,306 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,406 DEBUG read="" [client.py:398]
2022-11-06 11:56:04,406 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:04,431 DEBUG read="%vÝ!w�Å��É+ÊfåwhþL£úùú¢c+VeÅ" [client.py:398]
2022-11-06 11:56:04,431 DEBUG outstring="bytearray(b'%v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
c+\x04Ve\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:04,431 INFO received= [37, 118, 221, 33, 119, 133, 197, 156, 138, 201, 43, 202, 102, 229, 119, 104, 254, 76, 163, 250, 249, 250, 162, 30, 26, 126, 99, 43, 4, 86, 101, 197, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] [onlykey.py:179]
2022-11-06 11:56:04,432 INFO Received Public Key generated by OnlyKey= '2576dd217785c59c8ac92bca66e57768fe4ca3faf9fbb21e1a7e632b045665c5' [onlykey.py:186]
2022-11-06 11:56:04,432 INFO vk= <nacl.signing.VerifyKey object at 0x7fb7c3705c90> [onlykey.py:189]
2022-11-06 11:56:04,432 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,432 DEBUG fingerprint: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:253]
2022-11-06 11:56:04,432 INFO disconnected from OnlyKey [onlykey.py:117]
2022-11-06 11:56:04,453 DEBUG local SSH version: b'OpenSSH_9.1p1, OpenSSL 1.1.1q 5 Jul 2022\n' [init.py:144]
2022-11-06 11:56:04,453 DEBUG serving on /tmp/trezor-ssh-agent-xkohpmlm [server.py:30]
2022-11-06 11:56:04,454 DEBUG server thread started [server.py:121]
2022-11-06 11:56:04,454 INFO running ['ssh', '-p', '22222', '-l', 'ocean', '-o', 'IdentityFile=/tmp/trezor-ssh-pubkey-mguzfc2h', '-o', 'IdentitiesOnly=true', '10.1.1.250'] with {'SSH_AUTH_SOCK': '/tmp/trezor-ssh-agent-xkohpmlm', 'SSH_AGENT_PID': '198003'} [server.py:156]
2022-11-06 11:56:04,454 DEBUG waiting for connection on /tmp/trezor-ssh-agent-xkohpmlm [server.py:129]
2022-11-06 11:56:04,455 DEBUG subprocess 198017 is running [server.py:163]
2022-11-06 11:56:04,482 DEBUG welcome agent [server.py:90]
2022-11-06 11:56:04,482 DEBUG waiting for connection on /tmp/trezor-ssh-agent-xkohpmlm [server.py:129]
2022-11-06 11:56:04,482 DEBUG request: 208 bytes [protocol.py:97]
2022-11-06 11:56:04,482 DEBUG calling _unsupported_extension() [protocol.py:105]
2022-11-06 11:56:04,482 DEBUG reply: 5 bytes [protocol.py:108]
2022-11-06 11:56:04,482 DEBUG request: 1 bytes [protocol.py:97]
2022-11-06 11:56:04,482 DEBUG calling list_pubs() [protocol.py:105]
2022-11-06 11:56:04,482 DEBUG loading SSH public key: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICV23SF2hcWciskrydfld2j+TKP6+fqiHhp+YyswemXF ssh://ocean@10.1.1.250:22222|ed25519\n' [formats.py:260]
2022-11-06 11:56:04,482 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,483 DEBUG loaded ssh-ed25519 public key: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:266]
2022-11-06 11:56:04,483 DEBUG available keys: [b'ssh://ocean@10.1.1.250:22222|ed25519'] [protocol.py:117]
2022-11-06 11:56:04,483 DEBUG 1) f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [protocol.py:119]
2022-11-06 11:56:04,483 DEBUG reply: 107 bytes [protocol.py:108]
2022-11-06 11:56:04,539 DEBUG request: 213 bytes [protocol.py:97]
2022-11-06 11:56:04,539 DEBUG calling sign_message() [protocol.py:105]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG looking for f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [protocol.py:131]
2022-11-06 11:56:04,539 DEBUG loading SSH public key: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICV23SF2hcWciskrydfld2j+TKP6+fqiHhp+YyswemXF ssh://ocean@10.1.1.250:22222|ed25519\n' [formats.py:260]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG loaded ssh-ed25519 public key: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [formats.py:266]
2022-11-06 11:56:04,539 DEBUG using key b'ssh://ocean@10.1.1.250:22222|ed25519' (f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31) [protocol.py:139]
2022-11-06 11:56:04,539 DEBUG signing 149-byte blob with "ssh://ocean@10.1.1.250:22222|ed25519" key [protocol.py:146]
2022-11-06 11:56:04,539 DEBUG blob: b'\x00\x00\x00 o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba2\x00\x00\x00\x06ocean\x00\x00\x00\x0essh-connection\x00\x00\x00\tpublickey\x01\x00\x00\x00\x0bssh-ed25519\x00\x00\x003\x00\x00\x00\x0bssh-ed25519\x00\x00\x00 %v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1ac+\x04Ve\xc5' [client.py:34]
2022-11-06 11:56:04,539 DEBUG key type: b'ssh-ed25519' [formats.py:68]
2022-11-06 11:56:04,539 DEBUG b'ssh-connection': user b'ocean' via b'publickey' (b'ssh-ed25519') [client.py:40]
2022-11-06 11:56:04,539 DEBUG nonce: b'o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba' [client.py:42]
2022-11-06 11:56:04,539 DEBUG fingerprint: f9:31:c9:6e:58:e9:1a:7a:da:3a:a9:cb:b2:71:d9:31 [client.py:44]
2022-11-06 11:56:04,539 DEBUG hidden challenge size: 149 bytes [client.py:45]
2022-11-06 11:56:04,539 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]
2022-11-06 11:56:50,169 DEBUG connected [client.py:246]
2022-11-06 11:56:50,170 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,170 DEBUG msg=OKSETTIME [client.py:304]
2022-11-06 11:56:50,170 DEBUG payload=[99, 103, 146, 242] [client.py:328]
2022-11-06 11:56:50,170 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,188 DEBUG read="UNLOCKEDv2.1.2-prodc" [client.py:398]
2022-11-06 11:56:50,188 DEBUG outstring="bytearray(b'UNLOCKEDv2.1.2-prodc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')" [client.py:400]
2022-11-06 11:56:50,188 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
2022-11-06 11:56:50,188 DEBUG "ssh://ocean@10.1.1.250:22222|ed25519" signing b'\x00\x00\x00 o};\xc4\xfd\x92\xb2\x93\xdb\xe5\xed\x8b\x03\xd5>\x93\xce\xeb\xc5\xad\x16\xcac\xef6\x0b\xd7\xfes\x91Z\xba2\x00\x00\x00\x06ocean\x00\x00\x00\x0essh-connection\x00\x00\x00\tpublickey\x01\x00\x00\x00\x0bssh-ed25519\x00\x00\x003\x00\x00\x00\x0bssh-ed25519\x00\x00\x00 %v\xdd!w\x85\xc5\x9c\x8a\xc9+\xcaf\xe5wh\xfeL\xa3\xfa\xf9\xfa\xa2\x1e\x1a
c+\x04Ve\xc5' (ed25519) on OnlyKey [onlykey.py:248]
2022-11-06 11:56:50,189 INFO Identity to hash =b'ocean@10.1.1.250' [onlykey.py:280]
2022-11-06 11:56:50,189 INFO Identity hash =b'Zc\xb5/\xd2\x8b\x9eb\xf8\xa73\x1fa>\xe5G\xd4\x10T\x18\xe4\xa1\xad\xb8\r\x1b\xa6[\xac\x067N' [onlykey.py:281]
2022-11-06 11:56:50,189 INFO Key type ed25519 [onlykey.py:288]
2022-11-06 11:56:50,189 INFO Key Slot =201 [onlykey.py:311]
2022-11-06 11:56:50,189 DEBUG identity parts: ['ssh://', 'ocean@', '10.1.1.250', ':22222'] [interface.py:46]
Enter the 3 digit challenge code on OnlyKey to authorize ssh://ocean@10.1.1.250:22222|ed25519
1 4 2
2022-11-06 11:56:50,189 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,189 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,189 DEBUG payload=[201, 255, 0, 0, 0, 32, 111, 125, 59, 196, 253, 146, 178, 147, 219, 229, 237, 139, 3, 213, 62, 147, 206, 235, 197, 173, 22, 202, 99, 239, 54, 11, 215, 254, 115, 145, 90, 186, 50, 0, 0, 0, 6, 115, 116, 105, 98, 97, 120, 0, 0, 0, 14, 115, 115, 104, 45, 99, 111] [client.py:328]
2022-11-06 11:56:50,190 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,190 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,190 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,190 DEBUG payload=[201, 255, 110, 110, 101, 99, 116, 105, 111, 110, 0, 0, 0, 9, 112, 117, 98, 108, 105, 99, 107, 101, 121, 1, 0, 0, 0, 11, 115, 115, 104, 45, 101, 100, 50, 53, 53, 49, 57, 0, 0, 0, 51, 0, 0, 0, 11, 115, 115, 104, 45, 101, 100, 50, 53, 53, 49, 57, 0] [client.py:328]
2022-11-06 11:56:50,191 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,191 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,191 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,191 DEBUG payload=[201, 255, 0, 0, 32, 37, 118, 221, 33, 119, 133, 197, 156, 138, 201, 43, 202, 102, 229, 119, 104, 254, 76, 163, 250, 249, 250, 162, 30, 26, 126, 99, 43, 4, 86, 101, 197, 90, 99, 181, 47, 210, 139, 158, 98, 248, 167, 51, 31, 97, 62, 229, 71, 212, 16, 84, 24, 228, 161] [client.py:328]
2022-11-06 11:56:50,192 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,192 DEBUG preparing payload for writing [client.py:298]
2022-11-06 11:56:50,192 DEBUG msg=OKSIGN [client.py:304]
2022-11-06 11:56:50,192 DEBUG payload=[201, 10, 173, 184, 13, 27, 166, 91, 172, 6, 55, 78] [client.py:328]
2022-11-06 11:56:50,193 DEBUG sending message [client.py:341]
2022-11-06 11:56:50,293 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,294 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,394 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,394 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,494 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,494 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,594 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,594 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,695 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,695 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,795 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,795 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,895 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,895 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:50,995 DEBUG read="" [client.py:398]
2022-11-06 11:56:50,996 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,096 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,096 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,196 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,196 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,296 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,296 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,397 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,397 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,497 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,497 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,597 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,597 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,697 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,698 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,798 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,798 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,898 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,898 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:51,998 DEBUG read="" [client.py:398]
2022-11-06 11:56:51,998 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,098 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,099 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,199 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,199 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,299 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,299 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,399 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,399 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,500 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,500 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,600 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,600 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,700 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,700 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,800 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,801 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:52,901 DEBUG read="" [client.py:398]
2022-11-06 11:56:52,901 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,001 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,001 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,101 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,101 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,201 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,202 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,302 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,302 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,402 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,402 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,502 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,502 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,603 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,603 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,703 DEBUG read="" [client.py:398]
2022-11-06 11:56:53,703 DEBUG outstring="bytearray(b'')" [client.py:400]
2022-11-06 11:56:53,772 DEBUG read="HtòÀö�OÊXtJÚ�%÷1Èx
L¶à¯�ܹÀ�
M�´®�ÙÔ0þY�£�.ìNP�´ß¡äIJ" [client.py:398]
2022-11-06 11:56:53,772 DEBUG outstring="bytearray(b'Ht\xf2\xc0\xf6\x8aO
\xcaXtJ\x13\xda\x97%\xf71\xc8x\x0cL\xb6\xe0\xaf\x7f\x8a\xdc\xb9\xc0\x11\x9a\x0cM\x97\x10\xb4\xae\x80\xd9\x7f\xd40\xfeY\x99\xa3\x11\x81.\xecNP\x80\xb4\xdf\xa1\x1b\xe9\xe4IJ\x19\x03')" [client.py:400]
2022-11-06 11:56:53,772 INFO received= [72, 116, 242, 192, 246, 138, 79, 42, 202, 88, 116, 74, 19, 218, 151, 37, 247, 49, 200, 120, 12, 76, 182, 224, 175, 127, 138, 220, 185, 192, 17, 154, 12, 77, 151, 16, 180, 174, 128, 217, 127, 212, 48, 254, 89, 153, 163, 17, 129, 46, 236, 78, 80, 128, 180, 223, 161, 27, 233, 228, 73, 74, 25, 3] [onlykey.py:327]
2022-11-06 11:56:53,772 INFO disconnected from OnlyKey [onlykey.py:330]
2022-11-06 11:56:53,789 INFO disconnected from OnlyKey [onlykey.py:117]
2022-11-06 11:56:53,789 DEBUG signature: b'Ht\xf2\xc0\xf6\x8aO*\xcaXtJ\x13\xda\x97%\xf71\xc8x\x0cL\xb9\xe0\xaf\x7f\x8a\xdc\xb9\xc0\x11\x9a\x0cM\x97\x10\xb4\xae\x80\xd9\x7f\xd40\xfeY\x99\xa3\x13\x81.\xecNP\x80\xb4\xdf\xa1\x1b\xe9\xe4IJ\x19\x03' [protocol.py:155]
2022-11-06 11:56:53,789 DEBUG verify signature [formats.py:124]
2022-11-06 11:56:53,789 INFO signature status: OK [protocol.py:159]
2022-11-06 11:56:53,789 DEBUG signature size: 64 bytes [protocol.py:164]
2022-11-06 11:56:53,789 DEBUG reply: 92 bytes [protocol.py:108]
2022-11-06 11:56:53,802 DEBUG goodbye agent [server.py:98]
Linux orion 5.15.60-1-pve #1 SMP PVE 5.15.60-1 (Mon, 19 Sep 2022 17:53:17 +0200) x86_64

The first 30 second of delay accours on the following line:

2022-11-06 11:55:40,928 INFO identity #0: ssh://ocean@10.1.1.250:22222|ed25519 [init.py:287]

The remaning 1/2 minutes on the following line:

2022-11-06 11:56:04,539 INFO please confirm user "ocean" login to "ssh://ocean@10.1.1.250:22222|ed25519" using OnlyKey... [client.py:47]

Then the login succeded without any other problem as usualy after ask me the challenge (button press). Before this issue the challenge acoours immidiatly.
Thanks

@Stibax Is it possible to regularly reproduce this issue or was it a one time issue?

Sorry for late response. The problem is disappeared. So is one time and i think at this point, is related ti my system. So i close the issue.
Thanks.