Displaying 2 results from an estimated 2 matches for "fido_dev_get_assert".
2019 Nov 15
2
U2F support in OpenSSH HEAD
...and
> it really needs testing ahead of the next release.
Hi Damien,
Thanks for working on security key support, this is a really nice
feature to have in openssh.
My non-FIDO2 security key (YubiKey NEO) doesn't work with the latest
changes to openssh and libfido2, failing with `try_device:
fido_dev_get_assert: FIDO_ERR_USER_PRESENCE_REQUIRED`. I'm not sure if
this is a problem in libfido2 or sk-usbhid.c (I also reported this
issue at https://github.com/Yubico/libfido2/issues/73).
Is try_device incompatible with U2F keys? It seems to me to be trying
to detect the presence of a key handle using an as...
2019 Nov 01
10
U2F support in OpenSSH HEAD
Hi,
As of this morning, OpenSSH now has experimental U2F/FIDO support, with
U2F being added as a new key type "sk-ecdsa-sha2-nistp256 at openssh.com"
or "ecdsa-sk" for short (the "sk" stands for "security key").
If you're not familiar with U2F, this is an open standard for making
inexpensive hardware security tokens. These are easily the cheapest way