- From: Richard Barnes <rbarnes@mozilla.com>
- Date: Wed, 22 Jun 2016 12:58:53 -0400
- To: "Mandyam, Giridhar" <mandyam@qti.qualcomm.com>
- Cc: W3C WebAuthn WG <public-webauthn@w3.org>
- Message-ID: <CAOAcki-yH32UbN-vU1oCXq16U=fhwiE2tyDak2+N2A4d1RG-VA@mail.gmail.com>
On Wed, Jun 22, 2016 at 12:55 PM, Mandyam, Giridhar <
mandyam@qti.qualcomm.com> wrote:
> Excuse me, but a form of the proposed extension is actually in the
> specification already as an example – see
> https://w3c.github.io/webauthn/#sample-extensions.
>
Of course, examples are explicitly non-normative.
> I understand that Mozilla had little to no involvement in the FIDO
> efforts, but I think characterizing an extension that has already been
> discussed extensively as being a “general networking protocol” is
> inaccurate.
>
Like I said, I acknowledge that I'm late. Sorry, I was on vacation for a
few weeks :) Also, to be honest, I don't really count anything in FIDO as
"discussed extensively", since that's a closed forum.
I do have a general concern about abuse of this extension mechanism, and to
some degree I'm just catching on this as an example. I guess we can
discuss on the call why you think this is not an issue.
--Richard
>
>
> -Giri
>
>
>
> *From:* Richard Barnes [mailto:rbarnes@mozilla.com]
> *Sent:* Wednesday, June 22, 2016 9:50 AM
> *To:* Mandyam, Giridhar <mandyam@qti.qualcomm.com>
> *Cc:* W3C WebAuthn WG <public-webauthn@w3.org>
> *Subject:* Re: Proposal for a Location Extension, rev 3
>
>
>
> <hat type="individual"/>
>
>
> Sorry, I'm late here, and I'm going to be a little glib here because the
> call is coming up. But:
>
> This proposal seems like a huge abuse of the API. We are building an
> authentication API, not a general networking protocol. If you want a
> general protocol for shuffling data to and from off-board devices, please
> charter a new working group.
>
> Mozilla would probably formally object to such an extension.
>
>
>
> On Wed, Jun 22, 2016 at 12:45 PM, Mandyam, Giridhar <
> mandyam@qti.qualcomm.com> wrote:
>
> Thanks to Jeff H. for comments. Here is a revision.
>
>
>
> *Location Extension*
>
>
>
> This extension allows a WebAuthn Relying Party to request an authenticator
> to add a location object as extension data to either the packed attestation
> or assertion. The authenticator, if it supports the extension, can add
> location data to either a packed attestation or assertion.
>
>
>
> *Extension Identifier*
>
>
>
> webauthn.loc
>
>
>
> *Client argument*
>
>
>
> The argument {“webauthn.loc” : true} MUST be present in the
> makeCredential() or getAssertion() method.
>
>
>
> *Client processing*
>
>
>
> This extension can only be used during makeCredential() or
> getAssertion(). If the selected authenticator supports location extension,
> then the client MUST not prevent the extension authenticator data from
> being returned in either the packed attestation or assertion.
>
>
>
> *Authenticator argument*
>
>
>
> If the authenticator supports extension selection, then the client MUST
> pass the client argument encoded as a CBOR string.
>
>
>
> *Authenticator Processing*
>
>
>
> If the authenticator does not support the extension, then the
> authenticator MUST ignore the extension request. If the authenticator
> accepts the extension, then the authenticator SHOULD only add this
> extension data to a packed attestation or assertion.
>
>
>
> *Authenticator data*
>
>
>
> If the authenticator accepts the extension request, then authenticator
> data SHOULD provide location data in the form of a CBOR-encoded type 5 map
> to be included in the packed attestation or assertion. Examples of
> representations of the location object that can be encoded as a CBOR type 5
> map are provided in [1] and [2].
>
>
>
> [1] A. Popescu, “Geolocation API Specification”, W3C Candidate
> Recommendation, https://www.w3.org/TR/geolocation-API/#position_interface
>
> [2] J. Peterson, RFC 4119, “A Presence-based GEOPRIV Location Object
> Format”, Sec. 2.2.
>
>
>
>
>
>
>
>
>
Received on Wednesday, 22 June 2016 16:59:22 UTC