Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automatic pubkey extraction support for fido2-hmac #62

Merged
merged 1 commit into from
Jan 5, 2025

Conversation

nicdumz
Copy link
Contributor

@nicdumz nicdumz commented Jan 4, 2025

Tested:

  • Invalid (several pubkeys, no pubkeys) for fido2 and yubi generate expected errors.
  • Could edit existing secrets (wrapped for yubikey), modify them and wrap for fido2, then correctly decrypt them with only fido2 configured as decrypting identities.
  • Could rekey secrets for new hosts, decrypting with fido2

Tested:
  * Invalid (several pubkeys, no pubkeys) for fido2 and yubi generate expected errors.
  * Could edit existing secrets (wrapped for yubikey), modify them and wrap for fido2, then correctly decrypt them with only fido2 configured as decrypting identities.
  * Could rekey secrets for new hosts, decrypting with fido2
Copy link
Owner

@oddlama oddlama left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for adding fido support, looks great!

@oddlama oddlama merged commit f5a567b into oddlama:main Jan 5, 2025
1 check passed
@nicdumz nicdumz mentioned this pull request Jan 6, 2025
nicdumz added a commit to nicdumz/nix-config that referenced this pull request Jan 10, 2025
* FIDO2 keys for age decryption (on deploy machine).
* Add bistannix host keys.

This implies a local agenix-rekey flake until PR
oddlama/agenix-rekey#62 makes it upstream.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants