Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide two devices like Yubico #354

Open
ceving opened this issue Jan 6, 2020 · 6 comments
Open

Provide two devices like Yubico #354

ceving opened this issue Jan 6, 2020 · 6 comments
Labels
enhancement New feature or request

Comments

@ceving
Copy link

ceving commented Jan 6, 2020

This is an enhancement request.

It would be useful for SoloKeys to provide two devices like Yubico.

Yubico provides two devices:

hid-generic 0003:1050:0116.0002: input,hidraw1: USB HID v1.10 Keyboard [Yubico Yubikey NEO OTP+U2F+CCID] on usb-0000:00:15.0-8/input0
hid-generic 0003:1050:0116.0003: hiddev0,hidraw2: USB HID v1.10 Device [Yubico Yubikey NEO OTP+U2F+CCID] on usb-0000:00:15.0-8/input1

But SoloKeys provides just one device:

hid-generic 0003:0483:A2CA.0001: hiddev0,hidraw0: USB HID v1.11 Device [SoloKeys Solo 3.0.0] on usb-0000:00:15.0-3/input0

This is problematic in virtual environments. In order to pass through a USB device to a guest OS, it is necessary to have a device. If the host takes the device as an input device, there is nothing left, which can be passed to the guest. Yubico is less problematic, because the host can take the input device and the other device can be passed to the guest.

@My1
Copy link
Contributor

My1 commented Jan 14, 2020

well Yubico doesnt provide 2 devices for fun. the entire OTP interface runs on the Keyboard. the Solo doesnt have that?

also how do you pass other things that dont spawn multiple USB devices?

@tERyceNzAchE
Copy link

Would this allow (eventual) support for a static password on button press (like YubiKey) ?
I know there is no plan to implement this feature, but would providing a keyboard device make this possible?

@conorpp
Copy link
Member

conorpp commented Jan 15, 2020

This probably won't happen on the current hardware, but very likely on the new Solo revision being worked on.

@conorpp conorpp added the enhancement New feature or request label Jan 15, 2020
@nickray
Copy link
Member

nickray commented Jan 15, 2020

This is not a good issue, as the description is incorrect/misleading ;)

@tERyceNzAchE
Copy link

This is a GREAT issue, with a misleading title/description. :)

@My1
Copy link
Contributor

My1 commented Jan 15, 2020

I think differently, also I think this is an issue with your hypervisor as I have passed Solos using Virtualhere (granted not a hypervisor, but besides the point) to other computers more than often enough flawlessly

rgerganov added a commit to rgerganov/solo that referenced this issue Jun 8, 2020
This patch adds a keyboard HID interface to the existing FIDO2 HID
interface. It allows injecting keystokes into the host when the Solo
button is pressed. For now it injects the hardcoded sequence "1234".

The new interface is enabled with the ENABLE_KBD macro. Right now it
doesn't work with the other additional interfaces (CCID and CDC).
Advertising a random combination of USB interfaces (FIDO2, kbd, CCID,
CDC) requires more work and could be addressed in the future.

Issue: solokeys#354
rgerganov added a commit to rgerganov/solo that referenced this issue Jun 16, 2020
This patch adds a keyboard HID interface to the existing FIDO2 HID
interface. It allows injecting keystokes into the host when the Solo
button is pressed. For now it injects the hardcoded sequence "1234".

The new interface is enabled with the ENABLE_KBD macro. Right now it
doesn't work with the other additional interfaces (CCID and CDC).
Advertising a random combination of USB interfaces (FIDO2, kbd, CCID,
CDC) requires more work and could be addressed in the future.

Issue: solokeys#354
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

5 participants