https://bugzilla.mindrot.org/show_bug.cgi?id=2319
--- Comment #5 from Damien Miller <[email protected]> --- (In reply to Michael Stapelberg from comment #3) > (In reply to Damien Miller from comment #2) > > I think it is best that you start with a description of the "u2f" > > authentication method protocol - it's much better to review that the > > protocol is sound before looking at the implementation. Could you > > write this up? > > From that comment it sounds like there is some misunderstanding here > :). > > U2F stands for Universal Second Factor, see also > http://en.wikipedia.org/wiki/Universal_2nd_Factor > > You can find the protocol specification on > http://fidoalliance.org/specifications/download/ > > I’ve done a presentation at our local computer club, you can find > the slides here: > https://www.noname-ev.de/w/File:C14h-u2f-how-security-keys-work.pdf > — they contain a pretty high-level and easy to understand > description of U2F. > > Is that what you were looking for? If not, let me know :). No, I'm looking for a description of what goes on the wire for SSH. Like what RFC4252 does for the existing SSH authentication methods. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
