-
Notifications
You must be signed in to change notification settings - Fork 289
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs/install.md: formatting correction #675
Conversation
Hi, thank you for your interest and contribution! You can treat the pull request template as a reminder, and if it doesn't apply, no problem. I am curious why our Markdown linter workflow didn't catch this before. In fact, if I locally run
I see a long list of minor lints. But even that doesn't find the bug that this PR fixes. |
By the way, we usually accept PRs against |
Thank you & other contributors to make
Got it.
Yeah, and I noticed that there is the linter even for that. Amazing.
Interesting. I haven't got time myself yet to check all active linters & checkers in this project, but now I'm curious to look into that |
Aha... well, I was debating with myself on that, so thanks for pointing this out! But right now I'm literally on the go (just didn't want to leave your feedback unattended out of courtesy), so let me try to do that just using GitHub interface and I hope it will do the trick. Otherwise I will do it "today" but later. P.S. By the way, since we're here... I did get the "writing on the wall" that this project is experimental, not production ready and even from the point of theoretical & practical cryptography is not fully "safe" yet (like that mention about non-constant time). But out of curiosity: does anyone from Google employees use it with real tokens on a daily regular basis to login/authenticate for not-so-important resources? Just a "yes"/"no" question basically, thanks :) |
The base branch was changed.
I realized that the workflow runs this linter: I ran it, and the linter |
Oh, right... my Can I just make a separate proper PR for |
You can, but I was faster :) See #676. Feel free to open another PR if you find anything else! |
I realized I overlooked your question here:
I hope you don't mind an answer that is not just yes or no. This repository has the CTAP logic inside Our CTAP logic has been FIDO certified for branch 2.0, and I recently tested against their compatibility tool for 2.1 out of curiosity and we are passing. We are still changing the environment API from time to time, but the CTAP logic is not experimental in a sense that it's less safe than other security keys. Running OpenSK on the Nordic chip with software cryptography does have this downside though, that a local attacker could try side channel attacks etc. Whether or not this is part of your attacker model is up to you. Now, to finally answer your yes or no question: I have an OpenSK based security key on my desk that I use for real life login. |
No-no, not at all! Just to be clear - I added that disclaimer of mine about yes/no question only to save you time for something more important, but thank you so much for taking your time with such a detailed response. It was super interesting! Sincerely appreciate it.
Awesome! P.S. Just one more question out of curiosity about organization of this project on GitHub: if |
So we either have to try to send contributors to
|
Hello. I'm sorry for removing the template of Pull-Request form.
But this is just a tiny markdown syntax correction for
docs/install.md
which I noticed while was reading all available documents before putting my hands on this interesting project.P.S. I did sign
my soul toGoogle CLA agreement by specifying my GitHub account in accordance with this document (in case if it's really required here and/or for any other contribution to any other Google-related open source project).