Skip to content

Does the ssh-keygen have any vendor restrictions on FIDO devices? #3459

Answered by rimrul
laughingbro asked this question in Q&A
Discussion options

You must be logged in to vote

OpenSSH uses libfido2 to deal with FIDO devices. Their README claims libfido2 supports the FIDO U2F (CTAP 1) and FIDO 2.0 (CTAP 2) protocols.

OpenSSH seems to support them as ecdsa-sha2-nistp256 or ssh-ed25519 variants.

Did you verify that your eSecu supports one of those protocols and key types? Their current models seem to do that, but I'm unsure about potential older devices.

You could try to get more info from ssh-keygen with higher verbosity (-vvv) or trying to get a debug log from libfido2 (FIDO_DEBUG)

If ssh-keygen -vvv and FIDO_DEBUG don't help you figure this out, you might need to download the Git for Windows SDK and build the libfido2 examples against our libfido2.

Replies: 2 comments 3 replies

Comment options

You must be logged in to vote
3 replies
@laughingbro
Comment options

@dscho
Comment options

@laughingbro
Comment options

Comment options

You must be logged in to vote
0 replies
Answer selected by dscho
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants
Converted from issue

This discussion was converted from issue #3458 on October 12, 2021 07:26.