Universal 2nd Factor (U2F) Authentication for Secure Shell?
"S.P.Zeidler" <spz@serpens.de> Tue, 03 January 2017 18:48 UTC
Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 51F98129AD1
for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>;
Tue, 3 Jan 2017 10:48:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.3
X-Spam-Level:
X-Spam-Status: No, score=-7.3 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001,
RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-3.1, SPF_PASS=-0.001]
autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 44iDRcD2weQa
for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>;
Tue, 3 Jan 2017 10:48:09 -0800 (PST)
Received: from mail.netbsd.org (mail.NetBSD.org [IPv6:2001:470:a085:999::25])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
bits)) (No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id D7985129AD6
for <secsh-tyoxbijeg7-archive@lists.ietf.org>;
Tue, 3 Jan 2017 10:48:04 -0800 (PST)
Received: by mail.netbsd.org (Postfix, from userid 605)
id 94CCB85600; Tue, 3 Jan 2017 18:48:03 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: by mail.netbsd.org (Postfix, from userid 1347)
id 522A7855EF; Tue, 3 Jan 2017 18:48:03 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
by mail.netbsd.org (Postfix) with ESMTP id 5F6DC84CFB
for <ietf-ssh@NetBSD.org>; Tue, 3 Jan 2017 12:17:12 +0000 (UTC)
X-Virus-Scanned: amavisd-new at netbsd.org
Received: from mail.netbsd.org ([127.0.0.1])
by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025)
with ESMTP id KnM4mMb13-tv for <ietf-ssh@netbsd.org>;
Tue, 3 Jan 2017 12:17:12 +0000 (UTC)
Received: from serpens.de (serpens.de [195.22.142.107])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mail.netbsd.org (Postfix) with ESMTPS id 6CC7A84CEF
for <ietf-ssh@NetBSD.org>; Tue, 3 Jan 2017 12:17:11 +0000 (UTC)
Received: from serpens.de (spz@localhost [127.0.0.1])
by serpens.de (8.15.2/8.13.3) with ESMTPS id v03CGrSC013419
(version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK)
for <ietf-ssh@NetBSD.org>; Tue, 3 Jan 2017 13:17:05 +0100 (MET)
Received: (from spz@localhost) by serpens.de (8.15.2/8.12.11) id v03CGoKq001056
for ietf-ssh@NetBSD.org; Tue, 3 Jan 2017 13:16:52 +0100 (MET)
Date: Tue, 3 Jan 2017 13:16:49 +0100
From: "S.P.Zeidler" <spz@serpens.de>
To: ietf-ssh@NetBSD.org
Subject: Universal 2nd Factor (U2F) Authentication for Secure Shell?
Message-ID: <20170103121647.GF4689@serpens.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-message-flag: Please send plain text messages only. Thank you.
User-Agent: Mutt/1.5.24 (2015-08-30)
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list
Happy New Year, I've encountered https://www.ietf.org/archive/id/draft-josefsson-secsh-u2f-00.txt and wondered if this august forum had an opinion both on making u2f available in SSH and the draft given. regards, spz -- spz@serpens.de (S.P.Zeidler)
- Universal 2nd Factor (U2F) Authentication for Sec… S.P.Zeidler
- Re: Universal 2nd Factor (U2F) Authentication for… Ron Frederick
- Re: Universal 2nd Factor (U2F) Authentication for… S.P.Zeidler
- Re: Universal 2nd Factor (U2F) Authentication for… Simon Josefsson
- Re: Universal 2nd Factor (U2F) Authentication for… Mouse