-
Notifications
You must be signed in to change notification settings - Fork 69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
solo key verify crashes instantly #26
Comments
it does work when the solo has no pin set however. if you have no important accounts on your solo, you can reset then verify if it runs this using fido2 they might wanna set userverification to discouraged. |
Related: #20. I will have to check (it's been a while) whether it's possible to use simultaneously "direct attestation" (since we want to "verify" the key) and no user verification. Is this what a "discouraged" UV does? In this particular case, would be helpful for sure. |
user verification has 3 levels. more to read here: |
@My1 this is not quite applicable in this case. See https://fidoalliance.org/specs/fido-v2.0-rd-20170927/fido-client-to-authenticator-protocol-v2.0-rd-20170927.html#authenticatorMakeCredential "If pinAuth parameter is not present and clientPin been set on the authenticator, return CTAP2_ERR_PIN_REQUIRED error." |
@Vash63: I released a new version 0.0.13. Can you test by running Need to be a bit careful... After a few incorrect PINs, you can get yourself a few more tries by power cycling the key (pull out, put in again). After too many however, the key locks up fully and you have to |
#26 (comment) does makecredential only create a resident credential or also a normal one? because normal credentials can apparently be generated without pin like for example on the yubico demo site with both a yubi5 and a solo which both have a pin set. about your other post
you can get more? how much do you get without? because fido2 spec says 8 max. edit: okay scrolling further shows that there's also a 3 max per power cycle but it says to prevent malware from doing stuff, but how can malware submit pins when every pin thing seems to also ask for a button press? |
@nickray It's working now, thanks. There's still a rather ugly crash (instead of a formatted error) if you run it before inserting the key though, not sure how important that is. |
Yes, right now |
I've tested this on both a macos and archlinux system, both running python 3.7.4, and in both cases
solo key verify
causes an immediate crash.It crashes within a split second of me hitting enter before I have a chance to try and press the button on the key. My key is a Solo Secure running 2.4.2.
The text was updated successfully, but these errors were encountered: