Yubico / developers.yubico.com

Source code for generating our website
https://developers.yubico.com
53 stars 64 forks source link

FIDO2 SSH authorized_keys and verify-required keyword configuration #509

Closed daemonhorn closed 1 week ago

daemonhorn commented 1 year ago

The example shown for adding verify-required keyword to enforce user verification on a per-key basis from an SSH server is not the correct syntax for authorized_keys file entries.

Example shows appending verify-required keyword to the ssh public key. In actuality, this must be prepended to the desired public key line in the authorized_keys file.

See https://man.openbsd.org/sshd.8#AUTHORIZED_KEYS_FILE_FORMAT for correctly formatted options examples in authorized_keys.

Please update documentation to reflect this oversight. In addition, it would be useful to know which Yubikey versions support the verify-required user verification validation in openssh, since this is not a globally supported feature with all devices/key types.

joostd commented 1 week ago

Thank you, you are absolutely correct. We have recently updated that page, and it now shows a different option through server configuration.

As for the YubiKey versions: all FIDO2 keys should be able perform user verification, as that is a required FIDO2 feature. You do need to set a PIN before generating keys.

See Securing SSH with FIDO2