solo1 0.1.1

Creator: bradpython12

Last updated:

Add to Cart

Description:

solo1 0.1.1

Python tool and library for SoloKeys Solo 1
This CLI is for Solo 1, for the Solo 2 device use solo2-cli.
v0.1.0 was the last to be named solo-python, since v0.1.1 this project is named solo1-cli for clarity, and available from PyPI as solo1.
The CLI is now called solo1, for the time being solo will also be removed, but this is deprecated.
Getting Started
We require Python >= 3.6 and corresponding pip3 command.
We intend to support Linux, Windows and macOS. Other platforms aren't supported by the FIDO2 library we rely on.
To get started, run pip3 install solo1, this installs both the solo1 library and the solo1 command-line interface.
Possible issues:

on Linux, ensure you have suitable udev rules in place: https://docs.solokeys.dev/solo/udev/
on Windows, optionally install a libusb backend: https://github.com/libusb/libusb/wiki/Windows#driver-installation

For development, we suggest you run make init instead, which

sets up a virtual environment
installs development requirements such as black
installs solo1 as symlink using our packaging tool flit, including all runtime dependencies listed in pyproject.toml

One way to ensure the virtual environment is active is to use direnv.
Solo Tool
For help, run solo1 --help after installation. The tool has a hierarchy of commands and subcommands.
Example:
solo1 ls # lists all Solo keys connected to your machine
solo1 version # outputs version of installed `solo` library and tool

solo1 key wink # blinks the LED
solo1 key verify # checks whether your Solo is genuine
solo1 key rng hexbytes # outputs some random hex bytes generated on your key
solo1 key version # outputs the version of the firmware on your key

Firmware Update
Upon release of signed firmware updates in solokeys/solo,
to update the firmware on your Solo to the latest version:

update your solo1 tool if necessary via pip3 install --upgrade solo1
plug in your key, keeping the button pressed until the LED flashes yellow
run solo1 key update

For possibly helpful additional information, see https://github.com/solokeys/solo/issues/113.
Library Usage
The previous solotool.py has been refactored into a library with associated CLI tool called solo1.
It is still work in progress, example usage:
import solo

client = solo.client.find()

client.wink()

random_bytes = client.get_rng(32)
print(random_bytes.hex())

Comprehensive documentation coming, for now these are the main components

solo.client: connect to Solo Hacker and Solo Secure keys in firmware or bootloader mode
solo.dfu: connect to Solo Hacker in dfu mode (disabled on Solo Secure keys)
solo.cli: implementation of the solo1 command line interface

Challenge-Response
By abuse of the hmac-secret extension, we can generate static challenge responses,
which are scoped to a credential. A use case might be e.g. unlocking a LUKS-encrypted drive.
DANGER The generated reponses depend on both the key and the credential.
There is no way to extract or backup from the physical key, so if you intend to use the
"response" as a static password, make sure to store it somewhere separately, e.g. on paper.
DANGER Also, if you generate a new credential with the same (host, user_id) pair, it will likely
overwrite the old credential, and you lose the capability to generate the original responses
too.
DANGER This functionality has not been sufficiently debugged, please generate GitHub issues
if you detect anything.
There are two steps:

Generate a credential. This can be done with solo1 key make-credential, storing the
(hex-encoded) generated credential_id for the next step.
Pick a challenge, and generate the associated response. This can be done with
solo1 key challenge-response <credential_id> <challenge>.

License
Licensed under either of

Apache License, Version 2.0 (LICENSE-APACHE or
http://www.apache.org/licenses/LICENSE-2.0)
MIT license (LICENSE-MIT or http://opensource.org/licenses/MIT)

at your option.
Contributing
Any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
Code is to be formatted and linted according to Black and our Flake8 configuration
Run make check to test compliance, run make fix to apply some automatic fixes.
We keep a CHANGELOG.
Releasing
For maintainers:

adjust solo/VERSION file as appropriate
add entry or entries to CHANGELOG.md (no need to repeat commit messages, but point out major changes
in such a way that a user of the library has an easy entrypoint to follow development)
run make check and/or make fix to ensure code consistency
run make build to double check
run make publish (assumes a ~/.pypirc file with entry [pypi]), or flit publish manually
run make tag to tag the release and push it

License

For personal and professional use. You cannot resell or redistribute these repositories in their original state.

Files:

Customer Reviews

There are no reviews.