/keypass

PassKeeZ is a FIDO2/ Passkey compatible authenticator implementation for Linux

Primary LanguageZig

PassKeeZ

A FIDO2/ Passkey compatible authenticator for Linux based on keylib.

The project exclusively supports Linux due to the absence of a standardized API for interprocess communication (IPC) between the client and authenticator. As a workaround, platform authenticators on Linux act as virtual USB HID devices utilizing uhid. However, extending this functionality to other platforms remains unexplored as I haven't had the opportunity to investigate the equivalent mechanisms elsewhere.

Browser Supported? Tested version Notes
Cromium 119.0.6045.159 (Official Build) Arch Linux (64-bit)
Brave Version 1.62.153 Chromium: 121.0.6167.85 (Official Build) (64-bit)
Firefox 122.0 (64-bit)
Opera version: 105.0.4970.16 chromium: 119.0.6045.159

Note

All tests were conducted using passkey for Github.

Important

Browsers running in sandboxed environments might not be able to communicate with the authenticator out of the box (e.g. when installing browsers with the Ubuntu App Center).

Features

  • Works with all services that support Passkeys
  • Store your Passkeys (just a private key + related data) in a local, encrypted database
  • Constant sign-counter, i.e. you can safely sync your credentials/passkeys between devices.

Note

The release of version 0.3.0 removed the GUI. This means that you need version 0.2.5 if you want to delete credentials. A upcoming update will add credential management, which should also allow to modify credentials using a tool like fido2-token. The overall goal is to write a dedicated tool that allows the configuration of PassKeeZ via official commands.

Install

This project is installed by running the following command in your terminal.

Beta

sudo bash -c "$(curl -fsSL https://raw.githubusercontent.com/r4gus/keypass/master/script/install-beta.sh)"

Note

The following dependencies are required:

  • curl
  • git
  • libgtk-3-0

The script will make the following modifications:

  • PassKeeZ is installed to /usr/local/bin
  • zigenity (used for the user interface) is installed to /usr/local/bin
  • The user is added to the fido group
  • A udev rule is copied to /etc/udev/rules.d/90-uinput.rules
  • The uhid module is added to /etc/modules-load.d/fido.conf

Note

Databases generated by older versions are not compatible.

Database Management

Currently the only way to manage your Credentials is by using the CCDB command line application.

File synchronization

You can synchronize your database files using a service like Syncthing between your devices. This allows you to use the same Passkeys to login to your accounts on multiple devices.

Syncthing

Please see the Getting Started guide on how to setup Syncthing on your device. Make sure you also setup Syncthing to startup automatically, to prevent a situation where your databases are out of sync.

NOTE: For now, please make sure that you don't have the same database open on multiple devices simultaneously.

Contributing

Currently this application and the surrounding infrastructure (keylib, zbor, tresor) is only maintained by me. One exception is the graphics library dvui I use for the frontend.

If you find a bug or want to help out, feel free to either open a issue for one of the mentioned projects or write me a mail.

All contributions are wellcome! Including:

  • Bug fixes
  • Documentation
  • New features
  • Support for other systems (linux distros, OSs, ...)
  • ...

QA

What is this project about?

FIDO2 stands as a dedicated authentication protocol crafted for diverse authentication needs. Whether employed as a standalone method, supplanting traditional password-based authentication, or as an additional layer of security, FIDO2 serves both purposes. The FIDO Alliance has actively advocated for the widespread adoption of this protocol for several years, with 2023 witnessing a substantial surge in its adoption. However, it's crucial to note that FIDO2 introduces a heightened level of complexity in comparison to conventional passwords. Notably, the use of roaming authenticators, such as YubiKey, can be a cost-intensive aspect.

Upon initiating the keylib project in October 2022, my primary objective was to develop a library empowering individuals to transform their own hardware, such as ESP32, into a functional authenticator. I believe I've achieved this goal successfully. However, during this process, I also recognized the evolving trend favoring hybrid/platform authenticators with discoverable credentials, now commonly marketed as Passkeys.

While traditional authenticators like YubiKeys provide robust protection against various attacks, they come with notable drawbacks. Their high cost, limited update/patching capabilities, and restricted storage for discoverable credentials (for instance, my YubiKey 5 supports around 25 credentials) underscore these challenges. Additionally, the inability to back up data, although enhancing confidentiality, poses availability concerns. The official solution offered for this predicament is surprisingly simple: "buy a second one."

Conversely, platform authenticators present a more flexible and cost-effective alternative. Unlike traditional counterparts, they can undergo regular updates and patches, akin to any software component. Furthermore, these authenticators permit the backup and secure sharing of credentials, leveraging an encrypted database within this project.

One key advantage lies in their cost-effectiveness, eliminating the need for additional hardware. When implemented with precision, platform authenticators can attain a commendable level of security, providing a compelling alternative to their more expensive counterparts.

The primary objective of this project is to furnish an alternative —keeping in mind that the term "alternative" is subjective and, due to resource constraints, I may not offer a polished, "commercial-grade" product— to existing commercial Passkey implementations.

What is FIDO2/ Passkey? Please read the QA of the [keylib](https://github.com/r4gus/keylib) project.