-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot have multiple credentials per YubiKey #48
Comments
You absolutely can, I don't why know you're even seeing any credential at all since the credential shouldn't be discoverable. You can simply generate multiple credentials and provide them separated by comma |
I see. I just tried that but it created one credential with a name of 'cred1,cred2'. do I need fido2luks 0.3.0-alpha for that? |
ok, I think there's been a misunderstanding. Let's assume there are two LUKS devices:
Let's run this once for now to create the credential for $ fido2luks credential sda1
SDA1_CREDENTIAL_RESULT_HERE now we add these credentials to the respective LUKS devices: $ sudo fido2luks add-key /dev/sda1 SDA1_CREDENTIAL_RESULT_HERE
OK If one were to attempt to immediately unlock $ sudo fido2luks open /dev/sda1 root SDA1_CREDENTIAL_RESULT_HERE
OK Everything works. Let's now proceed to create our second credential for use on $ fido2luks credential sdb1
SDB1_CREDENTIAL_RESULT_HERE Add it to $ sudo fido2luks add-key /dev/sdb1 SDB1_CREDENTIAL_RESULT_HERE
OK Let's try to open $ sudo fido2luks open /dev/sdb1 data SDB1_CREDENTIAL_RESULT_HERE
OK Everything still works. Let's close our LUKS devices: $ sudo cryptsetup close root
$ sudo cryptsetup close data If we try to unlock both of these devices again: $ sudo fido2luks open /dev/sda1 root SDA1_CREDENTIAL_RESULT_HERE
FAIL
$ sudo fido2luks open /dev/sdb1 data SDB1_CREDENTIAL_RESULT_HERE
OK
that being said, if I run did I fundamentally misunderstand how I'm supposed to use this? is the idea here to use a separate salt between separate uses and the credential stays (from |
I'm running into this same issue. |
I'm not sure if I'm merely misunderstanding something or if this is a bug. If it is a bug, I'm not even sure if it's in
fido2luks
.As illustrated below, it appears that no matter what you name the credential, it seems to always clobber the previous credential.
I did some research on whether this is actually expected behavior but as far as I can tell
test1
andtest2
(being a "username") should be unique credentials even if they're both sharing the Relying Party ID offido2luks
.I tried digging through the code, both fido2luks at tag 0.2.20 and ctap_hmac, and I couldn't identify a reason for the fact that these credentials are getting clobbered.
Is this intentional? Is there a reason we can't have multiple fido2luks credentials per YubiKey (per FIDO2 device)?
Versions
The text was updated successfully, but these errors were encountered: