Maciej Żenczykowski
unread,Sep 6, 2023, 2:24:24 AM9/6/23Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Mike Frysinger, dragon788, chromium-hterm, Greg Steuck, Peter Huang, Will Young, Andrew Garrett
It's no secret we're using secure shell with physical keys...
and I know I have it working against some bog standard fedora VMs...
(touching the chromebook's power button is required to ssh in)
# uname -r
6.4.12-200.fc38.x86_64
# ssh-add -l
256 SHA256:X...w publickey (ECDSA)
256 SHA256:o...k corp/normal (ECDSA-CERT)
This is probably just using the ECDSA key stored in the dragonfly's power button
(possibly relies on crosh u2f_flags g2f ?), but I know I also had cert
based auth working
on a physical fedora machine at some point in the past (it's offline
atm, so can't check,
it was trivial to setup - just a few (possibly 1) lines to configure)
- though that was I think with some physical non-power button key
(probably doesn't matter).
The only hack appears to be '--config=google --no-proxy-host', and
possibly the gnubbyd chrome extension
(listed in some secure shell docs)
How does that differ from what is being asked here?
> To view this discussion on the web visit
https://groups.google.com/a/chromium.org/d/msgid/chromium-hterm/CAAbOSckWDYL5r2h0zg3xCeLYizSCjYJ9B3QFvtM__8A8QyfNdA%40mail.gmail.com.Maciej Żenczykowski, Kernel Networking Developer @ Google