Skip to content

antonioga1994/SoftU2F-Win

 
 

Repository files navigation

SoftU2F-Win is a software U2F authenticator for Windows. It emulates a hardware U2F HID device and performs cryptographic operations using the DPAPI. This tool works with Google Chrome. Running on other browsers hasn't been tested.

We take the security of this project seriously. Report any security vulnerabilities to i#xiaoba.me

Build Status

Installing

This app is still under very active development. It may have bugs or doesn't work in some scenarios. Please don't use for production.

Prerequisites

  • Disable Driver Signing Enforcement

    To install the driver, you'll need to disable the driver signing enforcement.

    The easiest way to do this is putting you device into Test Mode. Run this in elevated prompt

    $ bcdedit /set TESTSIGNING OFF
    

    More ways to disable the enforcement

Driver

  1. Download the latest driver release at Driver Release

  2. Run the driver-install.ps1 in elevated powershell.

Daemon

  1. Download
  • If you have latest .NET Core 3.0 SDK/Runtime installed you can download the FDE(Framework dependent executable) at Daemon Release
  • Otherwise you can download the SCD(Self-contained deployment) at Daemon Release
  1. Extrat and Run SoftU2FDaemon.exe

Usage

The app runs in the background. When a site loaded in a U2F-compatible browser attempts to register or authenticate with the software token, you'll see a notification asking you to accept or reject the request. You can experiment on Yubico's U2F demo site.

Registration

Registration

Authentication

Authentication

Uninstalling

Driver

  1. Right Click the Windows logo on you status bar and open Device Manager
  2. Under Human Interface Devices, find SoftU2F Device, right click and select Uninstall Device

Daemon

  1. Exit App
  2. Delete the folder where you extracted them.

Security considerations

This is a port of https://github.com/github/SoftU2F.

Instead of macOS Keychain, we store data using Windows DPAPI, which is designed by Microsoft Windows to store data data such as passwords, keys, and connection strings.

For more infomation of DPAPI: https://docs.microsoft.com/en-us/dotnet/api/system.security.cryptography.protecteddata?view=netframework-4.8#remarks

A note from Github Team

Signing

Announced by Microsoft,

Note Windows 10 for desktop editions (Home, Pro, Enterprise, and Education) and Windows Server 2016 kernel-mode drivers must be signed by the Windows Hardware Dev Center Dashboard, which requires an EV certificate. For details, see Driver Signing Policy.

Windows will only trust the drivers signed by a trusted EV certificate.

At this stage, I'm still trying to get a EV Certificate to sign this driver, so that Disabling driver signature enforcement won't be needed to run this software.

Having a signature won't change any of the behaviour of this software and all the source code is public to everyone to read and contribute.

Support

If you like this project, you can support me to buy a EV certificate, or just a cup of coffee :)

Known app-IDs/facets

Every website using U2F has an app-ID. For example, the app-ID of Yubico's U2F demo page is https://demo.yubico.com. When the low-level U2F authenticator receives a request to register/authenticate a website, it doesn't receive the friendly app-ID string. Instead, it receives a SHA256 digest of the app-ID. To be able to show a helpful alert message when a website is trying to register/authenticate, a list of app-ID digests is maintained in this repository. You can find the list here. If your company's app-ID is missing from this list, open a pull request to add it.

Licensing

This project is Unlicensed yet.

Credits

Lots of credits to the original work of SoftU2F done by Github team.

About

Software U2F authenticator for Windows

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C# 55.7%
  • C 43.9%
  • C++ 0.4%