| ▲ | Liskni_si 21 hours ago | |||||||
I really don't think this is true for FIDO2 like Yubikey. My understanding is that your ssh client gets a challenge from the server, reads the key "handle" from the private key file, and sends both to Yubikey. The device then combines its master key with the handle to get the actual private key, signs the challenge, and gives the result back to your ssh client. At no point does the private key leave the Yubikey. What am I missing? | ||||||||
| ▲ | wang_li 21 hours ago | parent [-] | |||||||
I don't know if you are missing anything. That's why I'm asking and making statements about how I understand the various processes to work. I want to understand how it is that the only device that interacts with the yubikey/tpm, when compromised, can't be subverted to the attackers ends. Thank you for your reply. | ||||||||
| ||||||||