[Bug 2319] [PATCH REVIEW] U2F authentication
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Thu Sep 17 19:08:19 AEST 2015
https://bugzilla.mindrot.org/show_bug.cgi?id=2319
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #13 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2710
--> https://bugzilla.mindrot.org/attachment.cgi?id=2710&action=edit
patch rebased to current upstream
I did informal review of the patch from comment 4, rebased it to
current upstream version and tested with yubikey neo. It worked well
and I also like the idea. There are few things to note:
* There is non-complete client option u2f_authentication, which is
used for allowing this type of authentication on client. This should be
covered in config parser and also documented in ssh_config (fixed)
* Build with gssapi was failing, because of undefined symbols in
monitor_wrap.c (included from auth-u2f.c). Added missing include
ssh-gss.h. (fixed)
* some functions from sshconnect2.c and ssh-u2f.c have wrong interface
for ssh_dispatch_set. Changing void to int and adding appropriate
return value.(fixed)
* SSL_load_error_strings function is used, but header providing this
function is not included. Adding appropriate include. (fixed)
Still there are some TODO comments, that should be taken care of.
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list