Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Non-extractable keys #4

Open
paroxp opened this issue Sep 20, 2019 · 4 comments
Open

Non-extractable keys #4

paroxp opened this issue Sep 20, 2019 · 4 comments

Comments

@paroxp
Copy link

paroxp commented Sep 20, 2019

It would be beneficial if the solokeys were capable of generating non-extractable gpg and ssh keys.

  • Protection against malware stealing keys
  • Protection against leaking the key
  • Protection against extracting the key by malicious actor
@merlokk
Copy link
Collaborator

merlokk commented Oct 30, 2019

Attestation was added as a Yubico-specific extension in version 3.4 of the OpenPGP Smart Card Specification

@My1
Copy link

My1 commented Nov 13, 2019

It would be beneficial if the solokeys were capable of generating non-extractable gpg and ssh keys.

I thought this is the default already (except on a hacker device)

@merlokk
Copy link
Collaborator

merlokk commented Nov 13, 2019

It's part of specification 3.4. This specification now not public, but can be downloaded from their ftp
If we talk about openpgp. As for u2f and fido2 - it another story

@merlokk
Copy link
Collaborator

merlokk commented Nov 13, 2019

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants