|
OpenBSD Security Functionally paranoid! |
|
Thread Tools | Display Modes |
|
|||
[OpenBSD 6.7] Using USB key U2F/Fido?!
Hi.
With OpenBSD 6.7, the lib fido(4) shipped or the manpage login_yubikey(8). https://man.openbsd.org/fido.4 http://man.openbsd.com/login_yubikey.8 Useful for one Yubikey. (with the tool yubikey-personalization-gui). OK, but if the USB key is not a Yubikey, as an HYPERSECU HyperFIDO Mini (U2F Security key), or another U2F key? to login at my X session? I note on dmesg, it is properly detected: Code:
uhidev5 at uhub1 port 1 configuration 1 interface 0 "HS HyperFIDO Token" rev 1.10/54.00 addr 3 uhidev5: iclass 3/0 fido0 at uhidev5: input=64, output=64, feature=0 but how I do to set my OS to use-it with browser web?! <= OK, I test with GitHub and GitLab. Without any modification of any file, it is well detected - with Firefox - and the 2FA succeeds! ---- I see on this article this other interesting information about OpenSSH 8.2 : It seems need to generate a new SSH key with algo ecdsa-sk or ed25519-sk before using U2F Key… for login to SSH. quid?!
__________________
GPG:Fingerprint ed25519 : 072A 4DA2 8AFD 868D 74CF 9EA2 B85E 9ADA C377 5E8E GPG:Fingerprint rsa4096 : 4E0D 4AF7 77F5 0FAE A35D 5B62 D0FF 7361 59BF 1733 Last edited by CiotBSD; 25th May 2020 at 12:22 AM. |
Tags |
fido, openbsd, security, u2f |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
"Forget passwords!": Google joins FIDO | J65nko | News | 1 | 30th April 2013 05:19 AM |