Authenticator support

  • @My1


    You misunderstood the point I think. Without the udev rules above, the U2F products are not usable by non-root users which is really bad. Eg, On my Debian desktop, I'm not connected as root user in normal context, I'm connected as nuxwin user (normal user without super privileges). Therefore, if I try to register my U2F device through google chrome on a site which provide U2F auth, this will not work because by default, the device is not readable/writable by user other than root. Hence, the user that put the USB stick into the USB port of the computer cannot use it... Of course, the udev rules above have to be added once by the root user. Normal users cannot edit udev conffiles. I must precise that the rules were been effective after rebooting only. There is surely a way to tell udev daemon to load them without rebooting but I've not searched more.

    badge.php?id=1239063037&bid=2518&key=1747635596&format=png&z=547451206

  • I don't think i misunderstood.
    To summarize what i read


    Without the rules only root can use them


    To set up the rules, root is needed
    So one way or another, root is needed at least once to use u2f

    asperger inside(tm)

  • @My1


    Exactly ;) From my point of view, those devices should be included in udev conf by default.

    badge.php?id=1239063037&bid=2518&key=1747635596&format=png&z=547451206

  • I don't exactly use linux all day so i dont rly know all the stuff in there.
    But why can only root add new hardware? In Windows it didnt aak me to set up anything, and even though i am technically an Admin, i set it in a way it needs uac with password for ANYTHING that wants permissions, so i should have gotten a prompt, but well i didnt.

    asperger inside(tm)

  • @My1


    Under linux (at least Debian) when you put a USB device into the USB port of your computer, there is some udev rules to apply on them (such as permissions). The rules depend on the product type and so on. If the system is not aware of how the permissions must be handled, access to those products is restricted by default. Under Windows, default permisssions are surely more relaxed, whatever the USB device you use or, the system has them already in its registry and knows already how to handle them. I don't use Windows anymore since 2005, excepted when I must deal with HTML/JS tests under MSIE and so on (In that case, I use the laptop of my wife)... The problem for Debian is that the device database is not kept up to date... I'm even wondering if by default there is a list for such devices...

    badge.php?id=1239063037&bid=2518&key=1747635596&format=png&z=547451206

  • Well debian isn't really kept up to date anyway, php7 has to be pulled from dotdeb for example (and even they don't have 7.1)

    asperger inside(tm)

  • @My1


    We have deviated a lot. I moved our last posts into dedicated thread ;) See Deviated subject from Authenticator thread (why Debian will not include PHP 7.1 in Debian Stretch)

    badge.php?id=1239063037&bid=2518&key=1747635596&format=png&z=547451206

  • yeah true. but seriously thanks for planning to put in U2F. putting the actual integration of imscp aside I may be able to help with it.


    (I did code some U2F validation stuffs [based around yubico's library] so I can use them on my php sites)

    asperger inside(tm)

  • It is clear enough (YubiKeyAuth plugin configuration file)?


    badge.php?id=1239063037&bid=2518&key=1747635596&format=png&z=547451206

  • I dunno if you guys check the timestamp (t) of the response, but if yes a tolerance window for that may be helpful so that (for some or another reason) too old validations cant be used but there would be a certain tolerance e.g. for clock drifts and stuff

    asperger inside(tm)