-
Notifications
You must be signed in to change notification settings - Fork 407
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ecdsa-sk and ed25519-sk #135
Comments
At the moment I don't have plans to implement it myself, though I wouldn't object if someone wants to implement it. The biggest consideration seems to be that it would pull in external libraries. |
@mkj Curve25519 is regarded to be more secure and performant than RSA. Please, consider implementing it. Someone even forked dropbear just to add this feature. Maybe implement their code? |
Dropbear already supports ed25519 key format and curve25519 key exchange.
This issue is about supporting U2F/FIDO keys for auth, the protocol is
https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.u2f
|
@mkj I generated keys with openssh and they don't work with dropbear, they are ignored and I'm asked for a password. I thought the conversion tool was for the unsupported formats. Do I have to convert them to make them usable by dropbear? |
Support for ecdsa-sk and ed25519-sk are now merged |
Are there any plans supporting these ?
The text was updated successfully, but these errors were encountered: