similar to: [Bug 3178] New: When authenticating with a -sk key, no 'touch security key' prompt displayed

Displaying 20 results from an estimated 9000 matches similar to: "[Bug 3178] New: When authenticating with a -sk key, no 'touch security key' prompt displayed"

2020 Jun 26
14
[Bug 3188] New: Problems creating a second ecdsa-sk key for a second Yubikey
https://bugzilla.mindrot.org/show_bug.cgi?id=3188 Bug ID: 3188 Summary: Problems creating a second ecdsa-sk key for a second Yubikey Product: Portable OpenSSH Version: 8.3p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5 Component: ssh-keygen
2019 Nov 01
10
U2F support in OpenSSH HEAD
Hi, As of this morning, OpenSSH now has experimental U2F/FIDO support, with U2F being added as a new key type "sk-ecdsa-sha2-nistp256 at openssh.com" or "ecdsa-sk" for short (the "sk" stands for "security key"). If you're not familiar with U2F, this is an open standard for making inexpensive hardware security tokens. These are easily the cheapest way
2023 Dec 17
0
How to set/specify an SK Device (Path) in ssh_config?
Hey *, I have more then one {Security Key,HSM}-FIDO2 device attached to my Linux machine (Arch Linux). With ``` # fido2-token -L /dev/hidraw7: vendor=0x1d50, product=0x60fc (CRYPTOTRUST ONLYKEY) /dev/hidraw5: vendor=0x20a0, product=0x42b2 (Nitrokey Nitrokey 3) ``` I am able to get the device paths of both SK, which I can use to generate an `ecdsa-sk` on a specific device: ``` $ ssh-keygen \ -t
2019 Jan 06
1
Chromium - Application-level nouveau blacklist
> Opinions welcome. I have a few ideas on the best way to approach this. - First of all, obviously, fix the WebGL CTS problems. (with --ignore-gpu-blacklist ) - Fix all other crashing issues and request re-inclusion. (This is comment #37.) Chrome versions are only 6 weeks, so not too bad of a lead time. - Set up fuzz testing to discover new crashing and stability issues before they impact
2024 May 16
2
[Bug 3691] New: Connection to localhost succeeds with disabled MAC
https://bugzilla.mindrot.org/show_bug.cgi?id=3691 Bug ID: 3691 Summary: Connection to localhost succeeds with disabled MAC Product: Portable OpenSSH Version: 9.7p1 Hardware: amd64 OS: Other Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at
2020 Feb 14
2
Announce: OpenSSH 8.2 released
OpenSSH 8.2 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2020 Feb 14
2
Announce: OpenSSH 8.2 released
OpenSSH 8.2 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2020 Feb 14
2
Announce: OpenSSH 8.2 released
OpenSSH 8.2 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2024 Jan 10
1
[Bug 3653] New: ConnectTimeout causes issue when connecting to an host via tsocks
https://bugzilla.mindrot.org/show_bug.cgi?id=3653 Bug ID: 3653 Summary: ConnectTimeout causes issue when connecting to an host via tsocks Product: Portable OpenSSH Version: 9.6p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5 Component: ssh
2020 Feb 05
19
Call for testing: OpenSSH 8.2
Hi, OpenSSH 8.2p1 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This is a feature release. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at
2023 Oct 16
1
ssh-agent hides sk "confirm user presence" message
On 16.10.23 04:59, Damien Miller wrote: > On Mon, 16 Oct 2023, openssh at tr.id.au wrote: >> When using the key without an agent, it prompts with a reminder to touch the key: >> >> $ ssh user at remote >> Confirm user presence for key ED25519-SK MD5:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX [...] >> But as soon as I add the key to an agent, it now hides that
2023 Oct 10
17
[Bug 3627] New: openssh 9.4p1 does not see RSA keys in know_hosts file.
https://bugzilla.mindrot.org/show_bug.cgi?id=3627 Bug ID: 3627 Summary: openssh 9.4p1 does not see RSA keys in know_hosts file. Product: Portable OpenSSH Version: 9.4p1 Hardware: SPARC OS: Solaris Status: NEW Severity: major Priority: P5 Component: ssh
2020 Jul 05
7
[Bug 3191] New: Issues when authorized_keys contains more than one ecdsa-sk public key
https://bugzilla.mindrot.org/show_bug.cgi?id=3191 Bug ID: 3191 Summary: Issues when authorized_keys contains more than one ecdsa-sk public key Product: Portable OpenSSH Version: 8.3p1 Hardware: amd64 OS: Linux Status: NEW Severity: enhancement Priority: P5 Component:
2021 Oct 17
14
[Bug 3355] New: no-touch-required flag not restored from hardware token
https://bugzilla.mindrot.org/show_bug.cgi?id=3355 Bug ID: 3355 Summary: no-touch-required flag not restored from hardware token Product: Portable OpenSSH Version: 8.4p1 Hardware: All OS: Linux Status: NEW Severity: normal Priority: P5 Component: ssh-keygen
2023 Jul 02
0
[Bug 3585] New: "misc.h" required when build the sk middleware ("sk-usbhid.c") as standalone library
https://bugzilla.mindrot.org/show_bug.cgi?id=3585 Bug ID: 3585 Summary: "misc.h" required when build the sk middleware ("sk-usbhid.c") as standalone library Product: Portable OpenSSH Version: 9.3p1 Hardware: All OS: All Status: NEW Severity: enhancement
2020 Jun 10
10
[Bug 3180] New: ssh-add -d cannot take key from stdin
https://bugzilla.mindrot.org/show_bug.cgi?id=3180 Bug ID: 3180 Summary: ssh-add -d cannot take key from stdin Product: Portable OpenSSH Version: 8.2p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh-add Assignee: unassigned-bugs at
2005 Jan 06
0
FreeBSD 5.3-RELEASE Errata Notice: FreeBSD-EN-05:02.sk
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 FreeBSD-EN-05:02.sk Errata Notice The FreeBSD Project Topic: sk(4) driver instability on SMP systems Category: core Module: sys_pci Announced: 2005-01-06 Credits: Peter Edwards, John-Mark Gurney, David
2023 Oct 16
1
ssh-agent hides sk "confirm user presence" message
Hey there, I've noticed some unexpected behavior when I occasionally need to forward an ed25519-sk key with ssh-agent. When using the key without an agent, it prompts with a reminder to touch the key: $ ssh user at remote Confirm user presence for key ED25519-SK MD5:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX User presence confirmed But as soon as I add the key to an agent, it now hides
2007 Oct 11
0
SK-9E21D + vlan + ifb
Hello! Scenario: kernel 2.6.22.9, SysKonnect SK-9E21D, vlan, redirecting for packets arriving on than vlan to ifb. Using tcpdump on ifb iinterface I see the following: 03:30:17.322484 5a:71:6f:15:00:17 > 00:00:5a:71:00:00, ethertype Unknown (0xcb69), length 1522: 0x0000: 2000 0800 4500 05dc 3a2f 4000 3c06 d868 ....E...:/@.<..h 0x0010: c299 9143 c3e6 0ec1 0050 0f2a
2020 Mar 05
3
Fwd: sk-api suggestions
Hello, I'm helping the Git for windows team and contributing in git-for-windows repository to help expand the OpenSSH support for fido2 devices on Windows. Currently we are using your internal implementation(sk-usbhic.c) however since Windows 10 version 1903 this requires administrator privileges. I'm trying to create a module for OpenSSH to use webauthn.dll instead of direct calling to