Software U2F authenticator for macOS
Перейти к файлу
Ben Toews 5babfb7eb7
cleanup/comments
2017-08-22 10:10:15 -06:00
APDU remove confusing copyright comment from file headers 2017-07-19 13:21:00 -06:00
APDUTests remove confusing copyright comment from file headers 2017-07-19 13:21:00 -06:00
SelfSignedCertificate version 3 2017-07-26 14:12:51 -06:00
SelfSignedCertificateTests remove confusing copyright comment from file headers 2017-07-19 13:21:00 -06:00
SoftU2F.xcodeproj Merge branch 'master' into sep 2017-08-18 14:34:41 -06:00
SoftU2FDriver don't allow multiple user clients 2017-08-01 11:57:46 -06:00
SoftU2FDriverLib remove confusing copyright comment from file headers 2017-07-19 13:21:00 -06:00
SoftU2FTool cleanup/comments 2017-08-22 10:10:15 -06:00
SoftU2FToolTests fix test 2017-08-18 16:43:39 -06:00
inc add copy of CC license 2017-07-21 12:03:48 -06:00
install-scripts Fix typo in postinstall 2017-08-16 06:40:37 -07:00
script version 3 2017-07-26 14:12:51 -06:00
.clang-format run clang-format 2017-02-02 18:27:08 -07:00
.gitignore reimplement keychain code in swift 2017-01-31 14:32:01 -07:00
CODE_OF_CONDUCT.md add CODE_OF_CONDUCT.md 2017-07-19 12:18:49 -06:00
CONTRIBUTING.md add CONTRIBUTING.md 2017-07-19 12:17:17 -06:00
LICENSE.md add license 2017-01-31 16:42:42 -07:00
README.md Add links to FF/Safari extensions in README 2017-08-11 16:06:43 -06:00
issue_template.md Update issue_template.md 2017-08-01 14:43:30 -06:00

README.md

Soft U2F is a software U2F authenticator for OS X. It emulates a hardware U2F HID device and performs cryptographic operations using the OS X Keychain. This tool works with Google Chrome and Opera's built-in U2F implementations as well as with the U2F extensions for OS X Safari and Firefox.

We take the security of this project seriously. Report any security vulnerabilities to the GitHub Bug Bounty Program.

Installing

You can download the installer here.

Usage

The app runs in the background. When a site loaded in a U2F-compatible browser attempts to register or authenticate with the software token, you'll see a notification asking you to accept or reject the request. You can experiment on Yubico's U2F demo site.

Registration

register

Authentication

authenticate

Uninstalling

Unload the launchd agent

$ launchctl unload ~/Library/LaunchAgents/com.github.SoftU2F.plist

Delete the launch agent plist

$ rm ~/Library/LaunchAgents/com.github.SoftU2F.plist

Delete the .app

$ sudo rm -rf /Applications/SoftU2F.app/

Unload the kernel extension (this may fail if a browser is still talking to the driver. Deleting the .kext and restarting the system will fix this)

$ sudo kextunload /Library/Extensions/softu2f.kext

Delete the kernel extension

$ sudo rm -rf /Library/Extensions/softu2f.kext

Tell macOS to forget about the installation

$ sudo pkgutil --forget com.GitHub.SoftU2F

Done

Security considerations

A USB authenticator stores key material in hardware, whereas Soft U2F stores its keys in the macOS Keychain. There is an argument to be made that it is more secure to store keys in hardware since malware running on your computer can access the contents of your Keychain but cannot export the contents of a hardware authenticator. On the other hand, malware can also access your browser's cookies and has full access to all authenticated website sessions, regardless of where U2F keys are stored.

In the case of malware installed on your computer, one meaningful difference between hardware and software key storage for U2F is the duration of the compromise. With hardware key storage, you are only compromised while the malware is running on your computer. With software key storage, you could continue to be compromised, even after the malware has been removed.

Some people may decide the attack scenario above is worth the usability tradeoff of hardware key storage. But, for many, the security of software-based U2F is sufficient and helps to mitigate against many common attacks such as password dumps, brute force attacks, and phishing related exploits.

Hacking

Building

You must have Xcode Command Line Tools installed to build this project.

# Install Commaned Line Tools
xcode-select --install

# Build softu2f.kext and SoftU2F.app.
script/build

Running

There are two parts to Soft U2F: the driver and the app. To use a modified version of the driver, you must disable System Integrity Protection. The app can be modified and run via Xcode normally.

Known app-IDs/facets

Every website using U2F has an app-ID. For example, the app-ID of Yubico's U2F demo page is https://demo.yubico.com. When the low-level U2F authenticator receives a request to register/authenticate a website, it doesn't receive the friendly app-ID string. Instead, it receives a SHA256 digest of the app-ID. To be able to show a helpful alert message when a website is trying to register/authenticate, a list of app-ID digests is maintained in this repository. You can find the list here. If your company's app-ID is missing from this list, open a pull request to add it.

License

This project is MIT licensed, except for the files in /inc, which are included with their own licenses.