Re: FIDO2 resident credentials

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Thanks Christian for your answer.

However, it seems to me you are contradicting yourself.

First, you argue that the reason why not to put FIDO RK handle into pub
stored on the server is because this makes it impossible to log in with a
stolen authenticator (unless you have the corresponding sk file).

Later you argue that using ssh -K to download the FIDO handle is safe
because this is allowed only when a correct PIN/fingerprint is provided.

Why a correct PIN/fingerprint argument cannot be used for the first point?
We are working under assumption that a stolen authenticator is useless (to
use with SSH) without providing the correct PIN/fingerprint.

Also it seems you ignored the part saying:

> I see no justifiable reason why to load resident keys from a FIDO
authenticator to the SSH client computer, which is what `ssh-add -K` does.
The normal way to work with resident credentials is to specify the RP ID
`ssh:` in the authentication request to the authenticator.

but that might be probably related to the point I raised above indicating
you are working with different set of assumptions than we are.

-- 
Best Regards / S pozdravom,

Pavol "Stick" Rusnak
Co-Founder, SatoshiLabs
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux