kaczmarczyck 7ab1b568fb Updated README to reflect maintenance status (#660)
* Updated README to reflect maintenance status

This PR is to be merged after the branches are reworked.

* FIDO -> CTAP

* Wording change to default branch
2023-11-09 14:28:39 +01:00
2023-11-08 10:05:46 +01:00
2021-11-19 17:55:12 +01:00
2022-10-10 15:34:05 +02:00
2022-10-10 15:34:05 +02:00
2020-10-09 15:15:22 +00:00
2020-01-30 11:47:29 +01:00
2022-10-10 15:34:05 +02:00
2022-10-11 01:36:02 +02:00
2022-10-10 15:34:05 +02:00
2020-11-30 08:46:02 -08:00
2020-01-30 11:47:29 +01:00
2020-03-03 14:56:11 +01:00
2020-12-16 18:22:15 +01:00
2022-10-10 15:34:05 +02:00
2020-01-30 11:47:29 +01:00
2020-06-09 16:56:38 +02:00
2020-09-29 12:56:21 +02:00
2020-01-30 11:47:29 +01:00
2021-07-09 13:05:18 +02:00
2022-10-10 15:34:05 +02:00
2022-10-11 01:36:02 +02:00

OpenSK logo

This branch is unmaintained. It implements the CTAP 2.0 version of OpenSK. Please check out the default branch for maintained code. If you are a developer, go to the develop branch.

OpenSK

This repository contains a Rust implementation of a FIDO2 authenticator. We developed OpenSK as a Tock OS application.

We intend to bring a full open source experience to security keys, from application to operating system. You can even 3D print your own open source enclosure! You can see OpenSK in action in this video on YouTube!

FIDO2

This branch implements the CTAP2.0 specification and is FIDO certified. OpenSK supports U2F, and non-discoverable credentials created with either protocol are compatible with the other.

⚠️ Disclaimer

This project is proof-of-concept and a research platform. It is NOT meant for a daily usage. The cryptography implementations are not resistent against side-channel attacks.

We're still in the process of integrating the ARM® CryptoCell-310 embedded in the Nordic nRF52840 chip to enable hardware-accelerated cryptography. Our placeholder implementations of required cryptography algorithms (ECDSA, ECC secp256r1, HMAC-SHA256 and AES256) in Rust are research-quality code. They haven't been reviewed and don't provide constant-time guarantees.

Hardware

You will need one the following supported boards:

Installation

To install OpenSK,

  1. follow the general setup steps,
  2. then continue with the instructions for your specific hardware:

To test whether the installation was successful, visit a demo website and try to register and login. Please check our Troubleshooting and Debugging section if you have problems with the installation process or during development. To find out what else you can do with your OpenSK, see Customization.

Contributing

See Contributing.md.

Reporting a Vulnerability

See SECURITY.md.

Description
OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
Readme 8.8 MiB
Languages
Rust 93.1%
Python 5%
Shell 1.5%
Makefile 0.4%