Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Ability to build verify-only routines without udev being present #297

Open
aaronmdjones opened this issue Mar 13, 2021 · 2 comments
Labels
feature request New feature or request

Comments

@aaronmdjones
Copy link

I would like the ability to build libfido2 without having to build against udev. Put simply, I would like to be able to use the library to verify FIDO signatures and such, but I don't need to be able to talk to any local FIDO hardware tokens.

This would end up being useful for OpenSSH, which has libfido2 as a dependency (if you build it with FIDO security key support). At the moment, OpenSSH with FIDO support is unusable on a machine that does not have udev, even if you only want to use FIDO functionality in the OpenSSH server on that machine.

@aaronmdjones aaronmdjones added the feature request New feature or request label Mar 13, 2021
@martelletto
Copy link
Contributor

I would like the ability to build libfido2 without having to build against udev. Put simply, I would like to be able to use the library to verify FIDO signatures and such, but I don't need to be able to talk to any local FIDO hardware tokens.

That is a fair request. There is prior art in that regard; for reference, libfido2 has been patched not to use udev here: oasislinux@eec0c3a#diff-10af2e83f2ada0a5e41a2b34a1a8b4fc889b4b7c768254c47fe883fd40613e13.

This would end up being useful for OpenSSH, which has libfido2 as a dependency (if you build it with FIDO security key support). At the moment, OpenSSH with FIDO support is unusable on a machine that does not have udev, even if you only want to use FIDO functionality in the OpenSSH server on that machine.

I don't think that's true; OpenSSH only uses libfido2 when it needs to talk to a FIDO device. As such, the only feature you lose by not activating the bits and pieces that use libfido2 in a OpenSSH server is the ability to use a FIDO device to store the host key; the verification of FIDO signatures is unaffected.

@aaronmdjones
Copy link
Author

I don't think that's true; OpenSSH only uses libfido2 when it needs to talk to a FIDO device. As such, the only feature you lose by not activating the bits and pieces that use libfido2 in a OpenSSH server is the ability to use a FIDO device to store the host key; the verification of FIDO signatures is unaffected.

Oh, my bad, I'd completely missed the sk-* key types in the output of $ ssh -Q key when built without security key support.

Well, this is a bit invalid then, but I'll leave the issue open due to your prior art link.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature request New feature or request
Development

No branches or pull requests

2 participants