Solo is an open source security key. We just launched Solo v2,
 
 
 
 
 
Go to file
taivlam fc8d2867c5 Fix minor typos
* Stylize "SoloKey"
* Spell out "receive" (since not explicitly used as CLI command)
2022-03-23 01:50:43 +01:00
.github Create FUNDING.yml 2021-04-08 12:05:56 -07:00
builds ability to build solo versions via `make docker-build SOLO_VERSION=...` 2019-02-14 00:35:28 +01:00
crypto Bump salty to 809cdf009fa52d97adb292a8547d13c9015d6a06. 2020-10-27 19:59:03 +01:00
docs docs(bootloader): point out order of actions for button method 2022-03-23 01:23:54 +01:00
fido2 fix credential ordering issue 2021-10-11 23:10:01 -05:00
metadata update metadata statements 2019-12-01 18:09:08 -05:00
pc Fix compilation warnings 2021-03-22 20:00:42 -07:00
targets/stm32l432 fix init order to prevent reset loop in some cases 2021-02-02 22:45:25 -08:00
tinycbor@878eb01b96 Update tinycbor 2019-04-24 19:04:33 -04:00
tools Replace references to solo-python with solo1-cli 2022-03-08 13:19:09 +01:00
udev Remove paranoid MM stuff, not signaling AT modem is enough + better 2019-03-22 20:01:31 +01:00
.all-contributorsrc docs: add saravanan30erd as a contributor (#507) 2021-01-27 20:04:11 -08:00
.editorconfig Start some cleanup 2019-01-03 14:24:34 +01:00
.envrc fix .envrc 2019-02-13 04:13:15 +01:00
.gitignore Add .sha2 to .gitignore 2019-10-27 10:11:39 -04:00
.gitmodules Add salty to .gitmodules. 2020-10-17 09:34:51 +02:00
.travis.yml Add Rust to travis and to the toolchain container. 2020-10-17 14:38:10 +02:00
99-solo.rules Cleanup udev rules, keep 99-solo.rules as symlink 2019-02-27 00:00:49 +01:00
ALPHA_VERSION use alpha 2019-03-07 21:19:10 -05:00
CODE_OF_CONDUCT.md update docs 2018-10-09 21:31:25 -04:00
Dockerfile Replace references to solo-python with solo1-cli 2022-03-08 13:19:09 +01:00
LICENSE Create LICENSE 2019-03-19 16:29:39 +01:00
LICENSE-APACHE update license to apache2 + mit 2019-02-12 17:18:17 -05:00
LICENSE-MIT update license to apache2 + mit 2019-02-12 17:18:17 -05:00
Makefile PC: make build using gcc 10 work. 2021-01-27 19:30:13 -08:00
README.md Fix minor typos 2022-03-23 01:50:43 +01:00
SECURITY.md Replace references to solo-python with solo1-cli 2022-03-08 13:19:09 +01:00
STABLE_VERSION Update STABLE_VERSION 2021-10-11 23:13:38 -05:00
in-docker-build.sh POC: add ed25519 support based on libsodium (PC) or salty (solo). 2020-10-17 14:40:41 +02:00
mkdocs.yml Added more information to start with Nucleo board. 2021-10-23 15:06:50 +02:00
runtime.txt start documentation 2018-09-15 16:19:09 +02:00

README.md

latest release Keybase Chat Build Status

Solo is an open source security key. We just launched Solo v2, join our campaign on Kickstarter!

Solo supports FIDO2 and U2F standards for strong two-factor authentication and password-less login, and it will protect you against phishing and other online attacks. With colored cases and multilingual guides we want to make secure login more personable and accessible to everyone around the globe.

This repo contains the Solo firmware, including implementations of FIDO2 and U2F (CTAP2 and CTAP) over USB and NFC. The main implementation is for STM32L432, but it is easily portable.

For development no hardware is needed, Solo also runs as a standalone application for Windows, Linux, and Mac OSX. If you like (or want to learn) hardware instead, you can run Solo on the NUCLEO-L432KC development board, or we make Solo for Hacker, an unlocked version of Solo that lets you customize its firmware.

Security

Solo is based on the STM32L432 microcontroller. It offers the following security features.

  • True random number generation to guarantee random keys.
  • Security isolation so only simple & secure parts of code can handle keys.
  • Flash protection from both external use and untrusted code segments.
  • 256 KB of memory to support hardened crypto implementations and, later, additional features such as OpenPGP or SSH.
  • No NDA needed to develop for.

Solo for Hackers

Solo for Hacker is a special version of Solo that let you customize its firmware, for example you can change the LED color, and even build advanced applications.

Check out solokeys.com, for options on where to buy Solo. Solo Hacker can be converted to a secure version, but normal Solo cannot be converted to a Hacker version.

If you have a Solo for Hacker, here's how you can load your own code on it. You can find more details, including how to permanently lock it, in our documentation. We support Python3.

For example, if you want to turn off any blue light emission, you can edit led_rgb() and change LED_INIT_VALUE to be a different hex color.

Then recompile, load your new firmware, and enjoy a different LED color Solo.

In the Hacker version, hardware is the same but the firmware is unlocked, so you can 1) load an unsigned application, or 2) entirely reflash the key. By contrast, in a regular Solo you can only upgrade to a firmware signed by SoloKeys, and flash is locked and debug disabled permanently.

Hacker Solo isn't really secure so you should only use it for development. An attacker with physical access to a Solo for Hacker can reflash it following the steps above, and even a malware on your computer could possibly reflash it.

Checking out the code

git clone --recurse-submodules https://github.com/solokeys/solo
cd solo

If you forgot the --recurse-submodules while cloning, simply run git submodule update --init --recursive.

make update will also checkout the latest code on master and submodules.

Checking out the code to build a specific version

You can checkout the code to build a specific version of the firmware with:

VERSION_TO_BUILD=2.5.3
git fetch --tags
git checkout ${VERSION_TO_BUILD}
git submodule update --init --recursive

Installing the toolchain and applying updates

In order to compile ARM code, you need the ARM compiler and other things like bundling bootloader and firmware require the solo1 python package. Check our documentation for details.

You can update your SoloKey after running pip3 install solo1 with solo1 key update for the latest version. To apply a custom image use solo1 program bootloader <file>(.json|.hex).

Installing the toolkit and compiling in Docker

Alternatively, you can use Docker to create a container with the toolchain. You can run:

# Build the toolchain container
make docker-build-toolchain

# Build all versions of the firmware in the "builds" folder
make docker-build-all

The builds folder will contain all the variation on the firmware in .hex files.

Build locally

Prereqs

  1. Install Rust and add the thumbv7em-none-eabihf target.
rustup target add thumbv7em-none-eabihf

Building

If you have the toolchain installed on your machine you can build the firmware with:

cd targets/stm32l432
make cbor
make build-hacker
cd ../..

make venv
source venv/bin/activate
solo1 program aux enter-bootloader
solo1 program bootloader targets/stm32l432/solo.hex

Developing Solo (No Hardware Needed)

Prereqs

  1. Need libsodium. On debian, install:
sudo apt install libsodium-dev

Building

Clone Solo and build it

git clone --recurse-submodules https://github.com/solokeys/solo
cd solo
make all

This builds Solo as a standalone application. Solo application is set up to send and receive USB HID messages over UDP to ease development and reduce need for hardware.

Testing can be done using our fork of Yubico's client software, python-fido2. Our fork of python-fido2 has small changes to make it send USB HID over UDP to the authenticator application. You can install our fork by running the following:

pip install -r tools/requirements.txt

Run the Solo application:

./main

In another shell, you can run our test suite.

You can find more details in our documentation, including how to build on the the NUCLEO-L432KC development board.

Documentation

Check out our official documentation.

Contributors

Solo is an upgrade to U2F Zero. It was born from Conor's passion for making secure hardware, and from our shared belief that security should be open to be trustworthy, in hardware like in software.

This project follows the all-contributors specification. Contributions of any kind welcome! The ultimate goal is to have a FIDO2 security key supporting USB, NFC, and BLE interfaces, that can run on a variety of MCUs. Look at the issues to see what is currently being worked on. Feel free to add issues as well.

Thanks goes to these wonderful people (emoji key):


Szczepan Zalega

💻 📖 🤔

Wessel dR

📖

Adam Langley

🐛 💻

Oleg Moiseenko

💻

Alex Seigler

🐛

Dominik Schürmann

🐛

Ernie Hershey

📖

Andrea Corna

🚇

Paul Jimenez

🚇 💻

yparitcher

🤔 🚧

StoyanDimitrov

📖

alphathegeek

🤔

Radoslav Gerganov

🤔 💻

Manuel Domke

🤔 💻 💼

Piotr Esden-Tempski

💼

f.m3hm00d

📖

Richard Hughes

🤔 💻 🚇 🔧

Kim Schulz

💼 🤔

Jakub

🐛

Jan A.

💻 📖

ccinelli

🚇 ⚠️

Nitrokey

💻 ⚠️ 🤔

Enrik Berkhan

💻 🚧 🤔

Saravanan Palanisamy

📖

dmpiergiacomo

💻 🐛

License

Solo is fully open source.

All software, unless otherwise noted, is dual licensed under Apache 2.0 and MIT. You may use Solo software under the terms of either the Apache 2.0 license or MIT license.

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

All hardware, unless otherwise noted, is dual licensed under CERN and CC-BY-SA. You may use Solo hardware under the terms of either the CERN 1.2 license or CC-BY-SA 4.0 license.

All documentation, unless otherwise noted, is licensed under CC-BY-SA. You may use Solo documentation under the terms of the CC-BY-SA 4.0 license

FOSSA Status

Where To Buy Solo

You can buy Solo, Solo Tap, and Solo for Hackers at solokeys.com.




License All Contributors Build Status Discourse Users Keybase Chat FOSSA Status

latest release commits since last release last commit commit activity contributors