A FIDO2/ Passkey compatible authenticator for Linux based on keylib.
The project exclusively supports Linux due to the absence of a standardized API for interprocess communication (IPC) between the client and authenticator. As a workaround, platform authenticators on Linux act as virtual USB HID devices utilizing uhid. However, extending this functionality to other platforms remains unexplored as I haven't had the opportunity to investigate the equivalent mechanisms elsewhere.
Browser | Supported? | Tested version | Notes |
---|---|---|---|
Cromium | ✅ | 119.0.6045.159 (Official Build) Arch Linux (64-bit) | |
Brave | ✅ | Version 1.62.153 Chromium: 121.0.6167.85 (Official Build) (64-bit) | |
Firefox | ✅ | 122.0 (64-bit) | |
Opera | ✅ | version: 105.0.4970.16 chromium: 119.0.6045.159 |
Note
All tests were conducted using passkey for Github.
Important
Browsers running in sandboxed environments might not be able to communicate with the authenticator out of the box (e.g. when installing browsers with the Ubuntu App Center).
- Works with all services that support Passkeys
- Store your Passkeys (just a private key + related data) in a local, encrypted database
- Constant sign-counter, i.e. you can safely sync your credentials/passkeys between devices.
Note
The release of version 0.3.0 removed the GUI. This means that you need version 0.2.5 if
you want to delete credentials. A upcoming update will add credential management, which
should also allow to modify credentials using a tool like fido2-token
. The overall goal
is to write a dedicated tool that allows the configuration of PassKeeZ via official commands.
This project is installed by running the following command in your terminal.
sudo bash -c "$(curl -fsSL https://raw.githubusercontent.com/r4gus/keypass/master/script/install-beta.sh)"
Note
The following dependencies are required:
curl
git
libgtk-3-0
The script will make the following modifications:
PassKeeZ
is installed to/usr/local/bin
zigenity
(used for the user interface) is installed to/usr/local/bin
- The user is added to the
fido
group - A udev rule is copied to
/etc/udev/rules.d/90-uinput.rules
- The
uhid
module is added to/etc/modules-load.d/fido.conf
Note
Databases generated by older versions are not compatible.
Currently the only way to manage your Credentials is by using the CCDB command line application.
You can synchronize your database files using a service like Syncthing between your devices. This allows you to use the same Passkeys to login to your accounts on multiple devices.
Please see the Getting Started guide on how to setup Syncthing on your device. Make sure you also setup Syncthing to startup automatically, to prevent a situation where your databases are out of sync.
NOTE: For now, please make sure that you don't have the same database open on multiple devices simultaneously.
Currently this application and the surrounding infrastructure (keylib, zbor, tresor) is only maintained by me. One exception is the graphics library dvui I use for the frontend.
If you find a bug or want to help out, feel free to either open a issue for one of the mentioned projects or write me a mail.
All contributions are wellcome! Including:
- Bug fixes
- Documentation
- New features
- Support for other systems (linux distros, OSs, ...)
- ...
What is this project about?
FIDO2 stands as a dedicated authentication protocol crafted for diverse authentication needs. Whether employed as a standalone method, supplanting traditional password-based authentication, or as an additional layer of security, FIDO2 serves both purposes. The FIDO Alliance has actively advocated for the widespread adoption of this protocol for several years, with 2023 witnessing a substantial surge in its adoption. However, it's crucial to note that FIDO2 introduces a heightened level of complexity in comparison to conventional passwords. Notably, the use of roaming authenticators, such as YubiKey, can be a cost-intensive aspect.
Upon initiating the keylib project in October 2022, my primary objective was to develop a library empowering individuals to transform their own hardware, such as ESP32, into a functional authenticator. I believe I've achieved this goal successfully. However, during this process, I also recognized the evolving trend favoring hybrid/platform authenticators with discoverable credentials, now commonly marketed as Passkeys.
While traditional authenticators like YubiKeys provide robust protection against various attacks, they come with notable drawbacks. Their high cost, limited update/patching capabilities, and restricted storage for discoverable credentials (for instance, my YubiKey 5 supports around 25 credentials) underscore these challenges. Additionally, the inability to back up data, although enhancing confidentiality, poses availability concerns. The official solution offered for this predicament is surprisingly simple: "buy a second one."
Conversely, platform authenticators present a more flexible and cost-effective alternative. Unlike traditional counterparts, they can undergo regular updates and patches, akin to any software component. Furthermore, these authenticators permit the backup and secure sharing of credentials, leveraging an encrypted database within this project.
One key advantage lies in their cost-effectiveness, eliminating the need for additional hardware. When implemented with precision, platform authenticators can attain a commendable level of security, providing a compelling alternative to their more expensive counterparts.
The primary objective of this project is to furnish an alternative —keeping in mind that the term "alternative" is subjective and, due to resource constraints, I may not offer a polished, "commercial-grade" product— to existing commercial Passkey implementations.