raspiblitz / raspiblitz

Get your own Bitcoin & Lightning Node running - on a RaspberryPi with a nice LCD
MIT License
2.47k stars 523 forks source link

Feature Request - OpenSSH update for Fido/U2F support #1282

Closed Silesia82 closed 4 years ago

Silesia82 commented 4 years ago

Is it possible to update openSSH from 7.9 to at least 8.2 Why: The ssh 8.2 update supports fido/U2F so it is possible to use a physical device to log into the ssh session. It would be able to use a yubikey or a open source solokey instead of a password. This adds more security because there is no possibility to steal the password by keyloggers. https://solokeys.com https://www.w3.org/2019/03/pressrelease-webauthn-rec.html.en

frennkie commented 4 years ago

What is the significance on Fido/U2F here..?

I already now use a YubiKey where my SSH private key is located that I use to ssh into the RaspiBlitz.

Silesia82 commented 4 years ago

Are you using a workaround? Yubico OTP provides online validation with their Server. Maybe thats why it works for you with yubikey. I have searched a lot and found no information about fido/u2f with solokeys. The only thing i found was, that its supported in openssh since 8.2. If there is another solution please link to it. Its my first week with solokeys and first month with raspiblitz :)

frennkie commented 4 years ago

Have a look here: https://developers.yubico.com/PGP/SSH_authentication/

I would assume that we will not upgrade OpenSSH away from the default Debian/Rasbian Buster supported version. If 'upstream' (Debian) moves to 8.2 then this will be included obviously.

On June 22, 2020 9:09:39 PM GMT+02:00, Silesia82 notifications@github.com wrote:

Are you using a workaround? Yubico OTP provides online validation with their Server. Maybe thats why it works for you with yubikey. I have searched a lot and found no information about fido/u2f with solokeys. The only thing i found was, that its supported in openssh since 8.2. If there is another solution please link to it. Its my first week with solokeys and first month with raspiblitz :)

-- You are receiving this because you commented. Reply to this email directly or view it on GitHub: https://github.com/rootzoll/raspiblitz/issues/1282#issuecomment-647719179

-- Sent from my Android device with K-9 Mail. Please excuse my brevity.

Silesia82 commented 4 years ago

Ok that makes sense. If it gets released it would be nice to add some user frindly support for this feature maybe. Thanks for the link.

Silesia82 commented 4 years ago

Have a look here: https://developers.yubico.com/PGP/SSH_authentication/ I would assume that we will not upgrade OpenSSH away from the default Debian/Rasbian Buster supported version. If 'upstream' (Debian) moves to 8.2 then this will be included obviously.

yubikey is closed source and the solution may not work, also this is too complicated to set up for me, i dont want to mess up my node. There is also a workaround with google authenticator but thats not what i want. It should work like this:

Generating key pair: ssh-keygen -t ecdsa-sk -f ~/.ssh/id_ecdsa_sk enter password or no password and press button Push key to server: ssh-copy-id -i ~/.ssh/id_ecdsa_sk.pub user@IP address

openoms commented 4 years ago

Just to add here I am using an otherwise unused Ledger/Trezor to log in through ssh via the https://github.com/romanz/trezor-agent/blob/master/doc/README-SSH.md

Not too difficult to set up, but I wouldn't automate this because it is better to understand what is happening: https://github.com/openoms/joininbox/blob/master/FAQ.md#log-in-through-ssh-using-a-hardware-wallet

Silesia82 commented 4 years ago

Ok, thanks so far. So we will have to wait till maybe 2021 when debian moves to 8.2 for a native support. Maybe it is possible to add fido/u2f to the RTL webbrowser. But i will close this "issue" (feature request) thank you all.