Reyk Floeter:
> TL;DR: this is an experimental port update to add U2F/FIDO support and
> I'd appreciate testing and feedback.
https://demo.yubico.com/webauthn/
Registration and subsequent login work fine for me with
* HyperFIDO Titanium (9 EUR, Amazon's Choice)
* Yubico Security Key
--
Christ
Landry Breuil wrote:
> On Tue, Dec 10, 2019 at 10:18:37AM -0700, Theo de Raadt wrote:
> > Landry Breuil wrote:
> >
> > > Well, i managed to have a 'video' pledge class, so you can probably get
> > > an 'uhidioctl' class :)
> >
> > I still feel the addition of 'video' pledge was an abuse of the
Landry Breuil wrote:
> On Tue, Dec 10, 2019 at 10:18:37AM -0700, Theo de Raadt wrote:
> > Landry Breuil wrote:
> >
> > > Well, i managed to have a 'video' pledge class, so you can probably get
> > > an 'uhidioctl' class :)
> >
> > I still feel the addition of 'video' pledge was an abuse of the
On Tue, Dec 10, 2019 at 10:18:37AM -0700, Theo de Raadt wrote:
> Landry Breuil wrote:
>
> > Well, i managed to have a 'video' pledge class, so you can probably get
> > an 'uhidioctl' class :)
>
> I still feel the addition of 'video' pledge was an abuse of the concept.
>
> firefox has done a pre
Landry Breuil wrote:
> Well, i managed to have a 'video' pledge class, so you can probably get
> an 'uhidioctl' class :)
I still feel the addition of 'video' pledge was an abuse of the concept.
firefox has done a pretty weak version of privsep that requires a
'master process' to have nearly all
On Tue, Dec 10, 2019 at 04:33:01PM +0100, Landry Breuil wrote:
> On Tue, Dec 10, 2019 at 03:20:15PM +, Reyk Floeter wrote:
> > On Tue, Dec 10, 2019 at 02:39:20PM +, Stuart Henderson wrote:
> > > On 2019/12/10 13:57, Reyk Floeter wrote:
> > > > +# U2F/FIDO keys
> > > > +/dev/uhid0 rw
> > > >
On Tue, Dec 10, 2019 at 03:20:15PM +, Reyk Floeter wrote:
> On Tue, Dec 10, 2019 at 02:39:20PM +, Stuart Henderson wrote:
> > On 2019/12/10 13:57, Reyk Floeter wrote:
> > > +# U2F/FIDO keys
> > > +/dev/uhid0 rw
> > > +/dev/uhid1 rw
> > > +/dev/uhid2 rw
> > > +/dev/uhid3 rw
> > > +/dev/uhid4
On Tue, Dec 10, 2019 at 02:39:20PM +, Stuart Henderson wrote:
> On 2019/12/10 13:57, Reyk Floeter wrote:
> > +# U2F/FIDO keys
> > +/dev/uhid0 rw
> > +/dev/uhid1 rw
> > +/dev/uhid2 rw
> > +/dev/uhid3 rw
> > +/dev/uhid4 rw
> > +/dev/uhid5 rw
> > +/dev/uhid6 rw
> > +/dev/uhid7 rw
> > +/dev/uhid8 r
On 2019/12/10 13:57, Reyk Floeter wrote:
> +# U2F/FIDO keys
> +/dev/uhid0 rw
> +/dev/uhid1 rw
> +/dev/uhid2 rw
> +/dev/uhid3 rw
> +/dev/uhid4 rw
> +/dev/uhid5 rw
> +/dev/uhid6 rw
> +/dev/uhid7 rw
> +/dev/uhid8 rw
> +/dev/uhid9 rw
BTW there are several entries in dmesglog with uhid18 (Microsoft Sur
Hi
TL;DR: this is an experimental port update to add U2F/FIDO support and
I'd appreciate testing and feedback. See the issues below why this
needs further work and discussion.
I've attached an updated port for Firefox 71 that adds support for
U2F/FIDO USB security keys under OpenBSD. Since ever
10 matches
Mail list logo