Mr Testman
unread,Aug 29, 2025, 9:59:28 AM (8 days ago) Aug 29Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to bVNC, aRDP, aSPICE, Opaque Remote Desktop Clients
Every SSH server now supports FIDO hardware based keys, but not a single VNC client can use these when tunneling over SSH.
I understand having to prompt the user to press the Yubikey at the appropriate moment would be very difficult if not impossible to code. The press request comes from within the libssh library and modifying it and continuing to keep it updated with such a change would be a Herculean task.
However I have a suggestion that might make support for FIDO based keys easier to support.
Ssh-keygen allows a "notouch" option where the user does NOT need to press the Yubikey. For some this may be considered less secure, but a notouch key is still hardware based and when a yubikey is in my pocket that key can not be used.
Now the support for FIDO based keys is already in libssh, this is really more of a compile issue, if you can do some extra checks to confirm the notouch option was used in the key creation then there is no need to prompt the user and these keys have the same user experience as a software based private key with no password.
I don’t have Android, but have Mac and iOS, I am familiar with testdrive and have different FIDO devices that I can test with. If you need a tester please contact me. Without the need to prompt the user the library support may already be there.