-
-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
U2F authentication support #1789
Comments
Initial support added in r18801. To use it:
./xpra/server/auth/u2f_auth.py It will print the public key and the key handle, both need to be preserved.
xpra start --start-child="xterm" --bind-tcp=0.0.0.0:10000,auth=u2f:public_key=041438f9c6cb2b6dec3a86e3b9eb7afe77112c817a371a9b0b74988619cf5f5b06b8211a4082818940de564aca8ac7dfecf34d23187b42340a261891c637cba794
XPRA_U2F_KEY_HANDLE=ebecec9d7665dec1e1c6261ede6ad7ba2556a07be705c4bff399b3acf37e00a6e82b26ebbb759418be22fa8bbbec6ac1c0007257d23550e63fdbf2853259499e \
xpra attach tcp://localhost:10000 -d auth And activate the U2F key when requested (ie: when it blinks). Still TODO:
There are other libraries we can use to interface with u2f, but they're not as nice, ie: python-u2flib-host. |
2018-03-23 12:27:48: antoine uploaded file
|
2018-03-23 12:29:55: antoine uploaded file
|
Updates:
Although we still support environment variables for specifying the key-handle and the public key, the preferred way is to store them as hexadecimal files in the application's user configuration directory (ie: Testing locally with an $18 FIDO U2F Security Key: xpra start --start-child="xterm" --bind-tcp=0.0.0.0:10000,auth=u2f -d auth connect with the client (activating the U2F device when requested, ie: when it blinks): xpra attach tcp://127.0.0.1:10000 -d auth To test using a remote client machine (ie: already tested with a linux, win32 and macos as both clients and servers): Future enhancements: |
See also smartcard API #1255.
The text was updated successfully, but these errors were encountered: