- From: =JeffH <Jeff.Hodges@KingsMountain.com>
- Date: Sun, 12 Nov 2017 16:02:01 +0800
- To: Adam Langley <agl@google.com>
- Cc: W3C Web Authn WG <public-webauthn@w3.org>
> On 11/11/17, 8:50 AM, "Adam Langley" <agl@google.com> wrote: > > Thank you for the frank discussion yesterday around the proposed > Privacy CA. And thanks to you and your colleagues for listening to our various thoughts and concerns. > Chrome feels that the PR #636 3-value enum is valuable Great, thanks. > and we very much hope that the vast majority of sites using webauthn > stick with the default and do not request attestation. Agreed. [...]> I’ve decided that when RPs request direct attestation using > that enum, Chrome plans on honouring that request by passing on the > actual attestation from the authenticator. Great, thank you. > We are no longer requesting any changes to the CTAP2 specification. Ok. > The discussion around proof-of-possession was interesting, however, > and we would certainly have no objection if a proof-of-possession > could be generated in the no-attestation case—maybe by adding that in > a future version of the specification. Ok. > We are aware of tokens on the market today that do not appear to be > complying with the 100K batch rules for attestation certificates. I wonder whether any of these authenticators are "FIDO Certified"? Providing your testing results back to the FIDO Authenticator Certification program [1] would be a good ecosystem deed, I suspect. As would the certification program being able to make use of such information. > We expect to be establishing a Chrome policy around security keys > and, based on that policy, blocklisting such tokens to solve the > resulting privacy problem. Thus such tokens can expect to have their > attestation certificates replaced with a random certificate. (This > random certificate will be generated within the Chrome process, not > via a Privacy CA). Hm. Absent such authenticator testing and assessment data being shared with all ecosystem participants, this sounds like Chrome&Android would be unilaterally behaving differently than other participants (e.g., other browser/platforms may or may not also "blind" such attestation certificates). I am not sure we would be comfortable with that. > If a site has requested direct attestation in such a case, the > request will fail. Are you saying here that Chrome will unilaterally fail the operation in this case, or that you advise Webauthn Relying Parties to fail the operation? We as a Relying Party would very much prefer to ourselves make the decision whether to fail the operation in such a case. We have requested "direct attestation", but have not stipulated a "level of assurance (LOA)" for the webauthn client (browser/platform) to _enforce_ on our behalf. Receiving "blinded attestation certificates", in such a direct attestation case, would be ok (I am thinking) if the blinding justification is publicly available and this behavior is openly specified such that all browsers/platforms have the opportunity to behave in the same manner. Having the blinded certificate identify themselves as such would be helpful it seems. > We continue to believe that the state of the MDS, For readers who might not be familiar with the MDS (FIDO Metadata Service), see [2]. > and the complexity > of verifying against it, will lead sites who wish to enforce > attestation towards solutions that are bad for the health of the > overall ecosystem and user experience. As an agent of the user, > Chrome cares deeply about such things. > > Since we will not be using a Privacy CA in the case that a site has > requested direct attestation, we are considering other plans to > ameliorate those concerns, such as denying attestation for any token > that’s not included in the MDS. That sounds like an interesting idea for holding authenticator vendors accountable. By "denying attestation" do you mean "blinding" the attestation certificate (aka substituting a "random certificate") as discussed above? Or do you mean failing the operation? > We urge vendors to take the MDS more > seriously and preemptively eliminate the need for such measures. Agreed. Perhaps a way we should think about the MDS is as "authenticator transparency" similar (in some high-level conceptual ways) to "certificate transparency"? Thank you for your thoughts and considerations on all of this. =JeffH [1] FIDO Authenticator Certification <https://fidoalliance.org/certification/authenticator-certification-levels/> [2] FIDO Metadata Service <https://fidoalliance.org/mds/> <https://fido-mds-parser.appspot.com/> <https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-metadata-service-v1.2-ps-20170411.html>
Received on Sunday, 12 November 2017 08:02:41 UTC