Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 3 Jun 2020 15:19:01 -0000 (UTC)
From:      Christian Weisgerber <naddy@mips.inka.de>
To:        freebsd-questions@freebsd.org
Subject:   Re: FIDO authentication
Message-ID:  <slrnrdffr5.1hrp.naddy@lorvorc.mips.inka.de>
References:  <24270.62418.992039.257025@jerusalem.litteratus.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 2020-05-27, Robert Huff <roberthuff@rcn.com> wrote:

> 	Various sites are reporting the FIDO Alliance
> ("https://www.fidoalliance.org") has announced a major common
> authentication initiative support by (/inter alia/) Google, Microsoft, 
> and Apple.
> 	I'm assuming this requires some level of OS support; is anyone in
> the FreeBSD community aware of/interested in this?

I depends on where you want to make use of this type of authentication.

At the application level, you only need access to uhid(4) devices.
You can install the security/u2f-devd port and add the user to group
u2f.  That is enough to use basic U2F (FIDO1) support in Firefox.

uhid1 on uhub0
uhid1: <Yubico Security Key by Yubico, class 0/0, rev 2.00/5.12, addr 19> on usbus0

Works fine for me at
https://demo.yubico.com/

OpenSSH 8.2 has added support for U2F/FIDO hardware authenticators:
https://www.openssh.com/txt/release-8.2
I haven't checked to what degree the security/openssh-portable port
supports this.

-- 
Christian "naddy" Weisgerber                          naddy@mips.inka.de



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?slrnrdffr5.1hrp.naddy>