Universal 2nd Factor (U2F) Authentication for Secure Shell?

"S.P.Zeidler" <spz@serpens.de> Tue, 03 January 2017 18:48 UTC

Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51F98129AD1 for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Tue, 3 Jan 2017 10:48:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.3
X-Spam-Level:
X-Spam-Status: No, score=-7.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-3.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 44iDRcD2weQa for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Tue, 3 Jan 2017 10:48:09 -0800 (PST)
Received: from mail.netbsd.org (mail.NetBSD.org [IPv6:2001:470:a085:999::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7985129AD6 for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Tue, 3 Jan 2017 10:48:04 -0800 (PST)
Received: by mail.netbsd.org (Postfix, from userid 605) id 94CCB85600; Tue, 3 Jan 2017 18:48:03 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: by mail.netbsd.org (Postfix, from userid 1347) id 522A7855EF; Tue, 3 Jan 2017 18:48:03 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 5F6DC84CFB for <ietf-ssh@NetBSD.org>; Tue, 3 Jan 2017 12:17:12 +0000 (UTC)
X-Virus-Scanned: amavisd-new at netbsd.org
Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id KnM4mMb13-tv for <ietf-ssh@netbsd.org>; Tue, 3 Jan 2017 12:17:12 +0000 (UTC)
Received: from serpens.de (serpens.de [195.22.142.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id 6CC7A84CEF for <ietf-ssh@NetBSD.org>; Tue, 3 Jan 2017 12:17:11 +0000 (UTC)
Received: from serpens.de (spz@localhost [127.0.0.1]) by serpens.de (8.15.2/8.13.3) with ESMTPS id v03CGrSC013419 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <ietf-ssh@NetBSD.org>; Tue, 3 Jan 2017 13:17:05 +0100 (MET)
Received: (from spz@localhost) by serpens.de (8.15.2/8.12.11) id v03CGoKq001056 for ietf-ssh@NetBSD.org; Tue, 3 Jan 2017 13:16:52 +0100 (MET)
Date: Tue, 03 Jan 2017 13:16:49 +0100
From: "S.P.Zeidler" <spz@serpens.de>
To: ietf-ssh@NetBSD.org
Subject: Universal 2nd Factor (U2F) Authentication for Secure Shell?
Message-ID: <20170103121647.GF4689@serpens.de>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
X-message-flag: Please send plain text messages only. Thank you.
User-Agent: Mutt/1.5.24 (2015-08-30)
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list

Happy New Year,

I've encountered
https://www.ietf.org/archive/id/draft-josefsson-secsh-u2f-00.txt
and wondered if this august forum had an opinion both on making u2f
available in SSH and the draft given.

regards,
	spz
-- 
spz@serpens.de (S.P.Zeidler)