u2f seed
James Bottomley
James.Bottomley at HansenPartnership.com
Sat Jan 4 03:34:05 AEDT 2020
On Fri, 2020-01-03 at 16:15 +0000, Fox, Kevin M wrote:
> How does a u2f website then authenticate the same user, with the same
> keyfob, on a different machine?
I thought I was clear the last time: The remote website account
creation process stores a u2f key handle in the remote website as part
of the user registration information (the token generates a new key for
*every* registration meaning every remote website has a different
authentication key). This key handle is usually implemented as the
wrapped key for the specific website, so every time you access that
website account from whatever client system, the server presents the
client with the stored key handle, which the client passes on to the
token, so you get the same key back because the token unwraps the key
handle from the server to use as the authentication key.
> If that actually works, then we should be able to use the same
> mechanism. Maybe it doesn't, and some people are going to be locked
> out of their account when their machine fails and they have to go to
> another one. portability was one of the selling points of u2f though
> I thought. Maybe I'll try and dig up the u2f spec and see if there is
> any detail in it.
There's nothing in the current ssh public key based process that can
present remote information to the local client. Without that, you have
to get the token's key handle locally which means if you take the
token to a different local client, you also need to bring the key
handle as well because the remote won't provide it.
James
More information about the openssh-unix-dev
mailing list