Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add 3rd party securitykeys/passkeys applications for broader support #111

Open
ben-grande opened this issue Jan 9, 2025 · 0 comments
Open
Labels
T: enhancement New feature or request

Comments

@ben-grande
Copy link
Owner

Current problem (if any)

libfido2 is not working with Qubes CTAP:

Administering a CTAP key from the client is prohibited:

I tried to use the Yubikey app through CTAP proxy and it didn't work. Didn't test Nitrokey app through CTAP.

fido2-token allows to administer a passkey, but it doesn't really work with all implementations. I could not reset a Yubikey with it (fido2-token -R -c /dev/hidraw2) but I did with the Yubikey app. Maybe Nitrokeys also have this problem.

Proposed solution

Installation formula for security keys applications on tpl-sys-usb:

I am normally against installing applications from outside the repositories because it can become a maintenance burden. I also don't like when it is not vendor neutral, such as fido2-token, but it doesn't completely work.

Another problem of not being vendor neutral is getting more requests to add 10 more vendor apps.... in the eyes of the user, "if I commit to these ones, why not commit to every other app".

The value to a user, and who that user might be

Users will be able to fully control their passkey through a GUI interface that supports all options their keys use.

@ben-grande ben-grande added the T: enhancement New feature or request label Jan 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
T: enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant