summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/sshd.8
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2020-08-27 01:07:11 +0000
committerDamien Miller <djm@cvs.openbsd.org>2020-08-27 01:07:11 +0000
commit81f7985adc76c9d3a95d80cb3717bcb54f906e79 (patch)
tree884b17cca38057c283a3aedc1df18a990aa800f1 /usr.bin/ssh/sshd.8
parentc6033e8945d214efd07c42b188f773dd96c8ca2e (diff)
support for requiring user verified FIDO keys in sshd
This adds a "verify-required" authorized_keys flag and a corresponding sshd_config option that tells sshd to require that FIDO keys verify the user identity before completing the signing/authentication attempt. Whether or not user verification was performed is already baked into the signature made on the FIDO token, so this is just plumbing that flag through and adding ways to require it. feedback and ok markus@
Diffstat (limited to 'usr.bin/ssh/sshd.8')
-rw-r--r--usr.bin/ssh/sshd.811
1 files changed, 9 insertions, 2 deletions
diff --git a/usr.bin/ssh/sshd.8 b/usr.bin/ssh/sshd.8
index fbf541c55e9..05a46329e4b 100644
--- a/usr.bin/ssh/sshd.8
+++ b/usr.bin/ssh/sshd.8
@@ -33,8 +33,8 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.\" $OpenBSD: sshd.8,v 1.312 2020/01/25 06:03:10 djm Exp $
-.Dd $Mdocdate: January 25 2020 $
+.\" $OpenBSD: sshd.8,v 1.313 2020/08/27 01:07:10 djm Exp $
+.Dd $Mdocdate: August 27 2020 $
.Dt SSHD 8
.Os
.Sh NAME
@@ -604,6 +604,13 @@ This option only makes sense for the FIDO authenticator algorithms
.Cm ecdsa-sk
and
.Cm ed25519-sk .
+.It Cm verify-required
+Require that signatures made using this key attest that they verified
+the user, e.g. via a PIN.
+This option only makes sense for the FIDO authenticator algorithms
+.Cm ecdsa-sk
+and
+.Cm ed25519-sk .
.It Cm restrict
Enable all restrictions, i.e. disable port, agent and X11 forwarding,
as well as disabling PTY allocation