[Bug 1387908] Update Released
Chris J Arges
1387908 at bugs.launchpad.net
Thu May 12 01:23:53 UTC 2016
The verification of the Stable Release Update for systemd has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
[udev] FIDO u2f security keys should be supported out of the box
Status in systemd package in Ubuntu:
Status in systemd source package in Trusty:
Status in systemd source package in Xenial:
* Users plugin U2F key and it does not work in Google Chrome
* Have stock ubuntu install, without custom U2F rules or libu2f-host0
* Use U2F factor authentication website e.g. google apps, github,
* Pluging in the key, should just work and complete U2F
authentication instead of timing out
* Should not conflict with libu2f-host0 udev rules which is where
these are currently shipped
FIDO u2f is an emerging standard for public-private cryptography based
2nd factor authentication, which improves on OTP by mitigating
phishing, man-in-the-middle attacks and reply attacks.
Google Chrome supports u2f devices which are now widely available from
Yubico (new premium neo Yubikeys and Security keys).
However, udev rules are required to setup permissions to allow the
web-browsers which are running as regular users to access the devices
KERNEL=="hidraw*", SUBSYSTEM=="hidraw", MODE="0664", GROUP="plugdev",
Something like that should be enabled by default, however probably not
encode on the vendor/productid as other vendors will also make u2f
To manage notifications about this bug go to:
More information about the foundations-bugs