xdg-credentials-portal
fido2luks
xdg-credentials-portal | fido2luks | |
---|---|---|
6 | 5 | |
328 | 132 | |
- | - | |
4.8 | 3.9 | |
7 months ago | 2 months ago | |
Rust | Rust | |
GNU Lesser General Public License v3.0 only | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
xdg-credentials-portal
-
GitHub Passkeys are generally available
If you mean "FIDO2 platform authenticator", this project looks promising: https://github.com/AlfioEmanueleFresta/xdg-credentials-porta...
- WebAuthN and Fido for Linux
- Bringing Modern Authentication APIs (FIDO2 WebAuthn, Passkeys) to Linux Desktop
fido2luks
-
Windows Hello like face recognition with swaylock
Do you have a guide about your approach for u2f + Luks ? I have a solokey so I don't know if I can do that. I am using this to unlock my luks volume: https://github.com/shimunn/fido2luks
-
yubikey for luks partitions on linux
I asked a question about while back about setting up yubikey with luks and someone suggested this to use fido with luks. I haven't tried it just yet but plan to test it out soon.
- How to Login an encrypted SSD running Ubuntu 20.04 alongside Windows 10 with my Yubikey 5 NFC?
-
Difference between yubico-pam and pam-u2f
I am on Arch and using https://github.com/agherzan/yubikey-full-disk-encryption since the key I had when configuring my laptop was YubiKey 4 Nano. However there is a similar project out there https://github.com/saravanan30erd/solokey-full-disk-encryption, which uses FIDO2 hmac-secret extension via fido2luks, which I prefer more (simply since it relies on FIDO2 only and works with any key).
-
replacing mkinitcpio with dracut (systemd-boot, LUKS+LVM)
According to fido2luks README, I followed the parameter shown in the grub here for my systemd-boot entry, but I'm guessing that the 2fa module is not built in natively (my syntax could be wrong, or messed something up with fido2luks)?
What are some alternatives?
webauthn-rs - An implementation of webauthn components for Rustlang servers
yubikey-full-disk-encryption - Use YubiKey to unlock a LUKS partition
truststore - Verify certificates using OS trust stores
solokey-full-disk-encryption - Use SoloKey to unlock a LUKS encrypted partition
rust-u2f - U2F security token emulator written in Rust
gentoo_unattented-setup - Automated modular GENTOO linux setup
tpm-fido - A WebAuthn/U2F token protected by a TPM (Go/Linux)
howdy - 🛡️ Windows Hello™ style facial authentication for Linux
certifi-system-store - certifi-system-store, a certifi hack to use system trust store on Linux and FreeBSD
keepassxc-browser - KeePassXC Browser Extension
authenticator-rs - Rust library to interact with Security Keys, used by Firefox