https://bugzilla.mindrot.org/show_bug.cgi?id=2319
--- Comment #3 from Michael Stapelberg <[email protected]> --- (In reply to Damien Miller from comment #2) > I think it is best that you start with a description of the "u2f" > authentication method protocol - it's much better to review that the > protocol is sound before looking at the implementation. Could you > write this up? From that comment it sounds like there is some misunderstanding here :). U2F stands for Universal Second Factor, see also http://en.wikipedia.org/wiki/Universal_2nd_Factor You can find the protocol specification on http://fidoalliance.org/specifications/download/ I’ve done a presentation at our local computer club, you can find the slides here: https://www.noname-ev.de/w/File:C14h-u2f-how-security-keys-work.pdf — they contain a pretty high-level and easy to understand description of U2F. Is that what you were looking for? If not, let me know :). -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
