xdg-credentials-portal
tpm-fido
xdg-credentials-portal | tpm-fido | |
---|---|---|
6 | 8 | |
328 | 279 | |
- | - | |
4.8 | 1.5 | |
7 months ago | 5 days ago | |
Rust | Go | |
GNU Lesser General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
xdg-credentials-portal
-
GitHub Passkeys are generally available
If you mean "FIDO2 platform authenticator", this project looks promising: https://github.com/AlfioEmanueleFresta/xdg-credentials-porta...
- WebAuthN and Fido for Linux
- Bringing Modern Authentication APIs (FIDO2 WebAuthn, Passkeys) to Linux Desktop
tpm-fido
- Tailscale doesn't want your password
- On-device WebAuthn and what makes it hard to do well
- Passkeys in Chrome
-
WebAuthN and Fido for Linux
I also found this: https://github.com/psanford/tpm-fido
FIDO2 should be used more, hopefully more sites end up supporting it sooner rather than later.
- Bringing Modern Authentication APIs (FIDO2 WebAuthn, Passkeys) to Linux Desktop
-
Uber Investigating Breach of Its Computer Systems
If you have a Linux PC with a TPM, you can use https://github.com/psanford/tpm-fido to create and "plug in" a virtual USB WebAuthn key whose secret is irretrievably stored in the machine's TPM. This effectively asserts that your specific machine is being used to enter a given site. However, it's important to remember it doesn't necessarily verify that *you're* present, or even if *anyone* is present at all, since the presence check is done via a software dialog and can be pwned along with the rest of the system.
-
WebAuthn, and Only WebAuthn
There are a huge number of other vendors supporting Webauthn apart from Yubikey. (From the top of my head Nitrokey, Solo, Tomu, Mooltipass, Ledger, Trezor, Google Titan, OnlyKey, Token2).
You could also use the system TPM (https://github.com/psanford/tpm-fido).
A brief search didn't yield any FIDO2 software-only solutions for Linux, but I see no reason why in principle you couldn't implement it (perhaps interfacing https://github.com/google/OpenSK through hidg - similar projects do exist for U2F).
-
How to bypass Sprint/T-Mobile 2FA in under 5 minutes
I made a FIDO token (a platform authenticator) implementation that uses the TPM to protect your private keys on Linux: https://github.com/psanford/tpm-fido
What are some alternatives?
webauthn-rs - An implementation of webauthn components for Rustlang servers
virtual-fido - A Virtual FIDO2 USB Device
truststore - Verify certificates using OS trust stores
SoftU2F - Software U2F authenticator for macOS
rust-u2f - U2F security token emulator written in Rust
OpenSK - OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
certifi-system-store - certifi-system-store, a certifi hack to use system trust store on Linux and FreeBSD
keepassxc - KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
keepassxc-browser - KeePassXC Browser Extension
fido2luks - Decrypt your LUKS partition using a FIDO2 compatible authenticator
SoftU2F-Win - Software U2F authenticator for Windows