Incomplete attestation data for FIDO2 SKs?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



I was recently looking at verifying the attestation data
(ssh-sk-attest-v00) for a SK key, but I believe the data saved in this
structure is insufficient for completing verification of the attestation.
While the structure has enough information for U2F devices, FIDO2 devices
sign their attestation over a richer "authData" blob [1] (concatenated with
the challenge hash). The authData blob contains data not derivable from the
public/private key, such as a signature counter and the device's AAGUID. As
I understand it, the attestation structure should probably persist the
entire authData blob to enable validation of the attestation. (This is
really only getting into support for verifying "packed" attestation
statements. Figuring out what to extract and persist is likely even more
nuanced for other formats, but I'm not terribly inclined to go there
myself.)

Is there something I'm missing that would enable verification of the
attestation signature for FIDO2 devices, or is this a correct assessment
that the ssh-sk-attest-v00 file saved from ssh-keygen would not be enough?

[1] https://www.w3.org/TR/2019/REC-webauthn-1-20190304/#sctn-attestation
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux