On 05/16/18 09:55, Benjamin Mord wrote:
Is this the same as issue 3524? https://github.com/QubesOS/qubes-issues/issues/3524 https://github.com/QubesOS/qubes-issues/issues/3612
.....I don't think the attachment is the issue, I can attach the yubikeys, the problem is they aren't operational as designed, and the issued gets confused, as people use the keys for various things, that aren't the same, eg the Qubes docs, talking about Yubikeys for authentication login, etc .
I am thinking it is different. I am new to Qubes, but it sounds like no U2F-specific sanitizing proxy exists, and like this is what is being proposed. I wonder if remoteu2f would be a good starting point for such a feature, although code comments suggest it is not yet doing sanitizing, which would need to be added.
.....if you fix U2F (which might be nice as apparently FF60.0 now supports U2f, before was just chrome) ..... please also fix OTP , in Q3.2 with no sys-usb I was able to use all my keys FWIW ....... I would think with 30,000 qube users, that there should be many security focused people with yubikeys, but I have only seen it mentioned rarely eg the host of the github project above Mr.Thiery in some 2018 posts, but afaik he was never able to find a solution
-- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c1ba286a-5298-5a59-8254-63bbb47eda0b%40riseup.net. For more options, visit https://groups.google.com/d/optout.
