Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Virtual authenticator? #31

Closed
gaetanww opened this issue Nov 22, 2018 · 5 comments
Closed

Virtual authenticator? #31

gaetanww opened this issue Nov 22, 2018 · 5 comments

Comments

@gaetanww
Copy link

gaetanww commented Nov 22, 2018

Reading through the docs and especially (Readme.md):

Note that our python-fido2 fork will only connect to the software FIDO2 application, not a hardware authenticator. Install Yubico's fork to do that.

I understood that it was possible to build solo as a software virtual authenticator? Is that true? If so, what is the status on that? And how to build solo for PC only? For now I'm getting a lot of undefined functions issues.

Thank you for your help

@gaetanww
Copy link
Author

I did some more digging around, so I'm goin g to answer part of my question:

  • This project is supposed to build a "virtual authenticator" that interact with python-fido2 through udp. However, it is not currently building, see Travis
    I found the last commit that built successfully: Travis and built it without problem.

@nickray
Copy link
Member

nickray commented Nov 22, 2018

There is some code in pc/ that "simulates" a FIDO2 token, and is helpful for developing code (mainly, the FIDO2-specific logic, without the additional complication of embedded development). To interact with that, we forked Yubico's client library python-fido2, so you can interact with the "pc" implementation over UDP.

What are your expectations of a "virtual authenticator"? I am pretty sure this is not it.

@gaetanww
Copy link
Author

gaetanww commented Nov 22, 2018

Yes that is what I meant by "virtual authenticator", sorry for the confusing terminology.
It's just that make all didn't work on HEAD, because some functions aren't implemented in pc/device.c, so I was confused as to whether or not it was possible to run solo on linux (over UDP).

(Just to clarify, I used "virtual authenticator" because that is what google called it for their u2f implementation)

Thank you for your answer :)

@conorpp
Copy link
Member

conorpp commented Nov 23, 2018

I added the missing functionality to pc/device.c and tested it works now (#33). It can be used as a software-only/virtual authenticator. It doesn't check for user presence and stores all state in local files. The counter and resident keys aren't stored, but that is relatively easy to add if needed.

@gaetanww
Copy link
Author

Awesome, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants