Nitrokey FIDO U2F is based on U2F Zero, an open source, open hardware U2F token for 2 factor authentication. It is implemented securely and works with Google accounts, Github, Duo, and anything else supporting U2F. Uses key derivation and has no limit on registrations.
Hardware files are provided here. Nitrokey's device differs in using a touch button instead of a regular one, as well as using smaller PCB and bigger flash MCU.
U2F key derivation algorithm, and other working details, are documented in files placed in the doc folder.
Instructions for H/W Rev4 and lower, based on UB10 MCU.
- Download Simplicity Studio 3 link (v4 will make bigger binary, which will not fit).
- Unpack it and run
./setup.sh
script. - Rename internal wine installation:
cd SimplicityStudio_v3/developer/utilities/third-party && mv wine{,_}
. - Install
wine-stable
package:sudo apt install wine-stable
. - Run Studio.
- Select and download proper dev kit (will be autodetected if debugger and device are connected).
- Register KEIL compiler.
- Build the source.
Pending. Simplicity Studio 4 will be used.
Udev rules might be required to use the device without administrator privileges. Please run ./install_rules.sh
script, which will copy rules file (./70-u2f.rules) to system directory on Ubuntu. For other OSes - please check the proper path and issue the copying manually.
Client and setup scripts are in ./tools/
directory.
License is the same as the base project: Simplified BSD License.