Can I use an iPhone connected via USB to a computer as a FIDO2 security key (for example in OpenSSH)? [migrated]

In the same way that I can use a Yubikey or any other FIDO2 hardware key to store resident keys for use with OpenSSH (for example ssh-keygen -t ed25519-sk -O resident -O verify-required) I would like to use my iPhone. I have my iPhone most… Continue reading Can I use an iPhone connected via USB to a computer as a FIDO2 security key (for example in OpenSSH)? [migrated]

FIDO2: should I set user verification to "discouraged" with two-factor authentication?

I provide a web application that uses FIDO2 for two-factor authentication. Recently I got reports that Windows users have to enter a PIN each time they use their hardware token. As far as I understand, this is considered a form of user ver… Continue reading FIDO2: should I set user verification to "discouraged" with two-factor authentication?

Reading SSH private key physically stored on yubikey to remote into external PC

I was wondering if it’s possible to only store and read a ssh private key on a yubikey and not read the private key the yubikey generated from a client computer?
Currently the only way it seems to work is that I store the private key on cl… Continue reading Reading SSH private key physically stored on yubikey to remote into external PC

Is FIDO2 authentication vulnerable to a social engineering replay attack?

I’m starting to learn about the FIDO2 standard, and I’m wondering if this scenario is possible…

Victim visits a credential harvesting page and enters their credentials
Credential harvesting backend opens a connection to the legitimate l… Continue reading Is FIDO2 authentication vulnerable to a social engineering replay attack?

What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]

We’ve all certainly heard about the widely overhyped BadUSB exploits on the Physon microcontrollers.
There’s certainly a high potential of gaining something by targeting such a specific device, which is designed to only contain secrets.
Ev… Continue reading What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]