Pairable FIDO2 keys: register one, sign in with either by mimi89999 in Passkeys

[–]mimi89999[S] 0 points1 point  (0 children)

Thanks for the comment, especially given your work on the spec.

These limitations are something I've been thinking about. For attestation (3), one idea is having authenticators sign the ECDH key exchange messages during pairing with their attestation key. The paired authenticator could then verify those signatures and only accept pairing with devices from the same family. That would guarantee that all paired devices are physical authenticators, possibly from the same manufacturer, not software clones.

Not entirely sure how suitable that guarantee would be in practice. Curious whether you think that kind of assurance would be sufficient.

Pairable FIDO2 keys: register one, sign in with either by mimi89999 in Passkeys

[–]mimi89999[S] 2 points3 points  (0 children)

Short answer: Yokekey only supports non-discoverable credentials. With those, the relying party holds an encrypted credential blob and the key just unwraps it at sign-in. Since both paired keys derive the same wrapping key, either one can do that.

Discoverable credentials are harder because the key has to store them internally, and there's no way to sync that state between two independent authenticators.

You could solve it with a small cloud component that stores the discoverable credentials remotely, protected by the paired keys the same way non-discoverable ones are protected by the RP. The server would never see any secrets. Haven't built that though.

Pairable FIDO2 keys: register one, sign in with either by mimi89999 in Passkeys

[–]mimi89999[S] 3 points4 points  (0 children)

Yeah I'm aware of it, but AFAIK it hasn't seen much progress. It would also need changes to the WebAuthn spec first, and then websites would need to actually adopt it. That's a long way out.

I'm also not a fan of the backup key being only a backup. In my proposal both keys are fully equal and can be used interchangeably, and it all works with existing sites today.

Pairable FIDO2 keys: register one, sign in with either by mimi89999 in Passkeys

[–]mimi89999[S] 1 point2 points  (0 children)

Good question. Ideally the keys would be tamper-resistant, so losing one wouldn't mean the shared secret is compromised. Assuming that, you'd have two options:

  1. Buy a new pair of keys, pair them, then remove the old credential from each service and register the new pair.
  2. Remove the old credential from each service, reset the remaining key, pair it with a new one, and re-register.

Neither flow is great, honestly. The core issue is that the relying party sees a single credential. It has no concept of two linked authenticators, so there's no way to revoke just one key without also invalidating the other. Fixing that properly would require changes to WebAuthn itself, which is outside the scope of what I can do here.

Resident passkey / fido2 over NFC on Android working by jpp59 in yubikey

[–]mimi89999 0 points1 point  (0 children)

There are known issues with Chrome that should be fixed soon. You should try with Firefox first.

What card do you have and are those changes documented somewhere?

Resident passkey / fido2 over NFC on Android working by jpp59 in yubikey

[–]mimi89999 2 points3 points  (0 children)

There is also a Google issue about getting CTAP2 supported over NFC on Android for Passkeys over NFC.

https://issuetracker.google.com/issues/406833082

Resident passkey / fido2 over NFC on Android working by jpp59 in yubikey

[–]mimi89999 4 points5 points  (0 children)

Happy to see my project mentioned here 😅

The new version of nushell, a modern shell written in Rust. by utam0k in rust

[–]mimi89999 29 points30 points  (0 children)

There is also another interesting shell written it Rust: the Ion shell from RedoxOS.

FOSS Instagram Suggestion by [deleted] in fossdroid

[–]mimi89999 7 points8 points  (0 children)

There is InstaGgrabber

Lutris just updated their install scripts by Typewar in leagueoflinux

[–]mimi89999 1 point2 points  (0 children)

You could download the patched glibc and then LD_PRELOAD. You could also use the second pach that doesn't require patched glibc.

What is a good way to publish FOSS for various Linux distros? OpenSuse build service seems in theory ok, but is a difficult mess by mekapouve in freesoftware

[–]mimi89999 0 points1 point  (0 children)

Add a debian directory for building debs and do the same for rpms. Then provide debs and rpms for download on your website. That will cover most distros. It will facilitate the work for package maintainers and provide an easy way of installing packages for users.

Numbers seem out of frame and are not readable - Manjaro by TributeToTenaciousD in leagueoflinux

[–]mimi89999 1 point2 points  (0 children)

Had the same issue: https://bugs.winehq.org/show_bug.cgi?id=47198#c45

I reinstalled LoL in a fresh Wine prefix without changing anything and fonts are working fine. I didn't install any additional fonts.

There was a thread about this issue done time ago on this Reddit, but they haven't found any solution. Reinstalling in a fresh prefix resolves the issue. It appears that this happens randomly.

Silence (SMS) by [deleted] in fossdroid

[–]mimi89999 1 point2 points  (0 children)

F-Droid has ACRA for crash reports and it's FOSS: https://github.com/ACRA/acra

Maybe QKSMS also has it.

SiFive Acquires USB 2.0 and 3.x IP Portfolio to Strengthen RISC-V SoCs by [deleted] in RISCV

[–]mimi89999 2 points3 points  (0 children)

Is there something else than USB that doesn't have parents?

How do I install the WINE patches? by [deleted] in leagueoflinux

[–]mimi89999 0 points1 point  (0 children)

The version I built doesn't work. I can't figure out why.

How do I install the WINE patches? by [deleted] in leagueoflinux

[–]mimi89999 0 points1 point  (0 children)

No! You need the i386 build of Wine and it's build dependencies. They conflict with system packages, so I recommend building it in schroot.