- From: =JeffH <Jeff.Hodges@KingsMountain.com>
- Date: Wed, 14 Mar 2018 14:34:06 -0700
- To: W3C Web Authn WG <public-webauthn@w3.org>
[ note: we agreed on the call today to publish a WD-09 containing these
new modest commits..
* e155bae 2018-03-14 | fix linking errors, ref
PublicKeyCredentialCreationOptions rather than
MakePublicKeyCredentialOptions (#840) (HEAD -> master, origin/master,
origin/HEAD) [=JeffH]
* c53c1d1 2018-03-14 | move Johan from contributors to acknowledgements
(#839) [Samuel Weiler]
* f0a495b 2018-03-14 | Remove vestigial reference to
CollectedClientData/clientExtensions (#835) [Mike Jones]
* 9c60eed 2018-03-12 | Add links to two previous working drafts (#834)
[Angelo Liao]
..since WD-08. ]
here's a compendium of the changes in WD-09 from WD-07 I gleaned this
afternoon using
<http://kingsmountain.com/doc/diff/diff-webauthn-WD-08a--from--WD-07.pdf>:
* Clarifies backwards compatibility with FIDO U2F, and its reliance on
FIDO AppID.
* Adopts the the CTAP2 canonical CBOR encoding form for all CBOR-encoded
data.
* Further alignment with Credential Management, e.g., defining Public
Key Credential Source, adding [[preventSilentAccess]] internal method.
* Futher refines the [[Create]] (aka createCredential) and
[[DiscoverFromExternalSource]] (aka getAssertion) algorithms in order to
address potential side-channel timing attacks that could enable
user-identifying information.
* Adds authenticatorCancel operation to the Authenticator Model.
* Uses only SHA-256 for hashing the client data.
* Authentication extension data is no longer included in collected
client data.
* Clarifies the WebAuthn Authenticator Model, and refines & corrects the
authenticatorMakeCredential and authenticatorMakeCredential operations.
* Clarifies Attested Credential data, and adds examples of
credentialPublicKey values encoded in COSE_Key format.
* Renames Privacy CA as Attestation CA to conform with TCG TPMv2 specs.
* Adds "None" as a formal Attestation Type, and defines a "None
attestation statement format".
* Clarifies the signature formats for Packed Attestation, FIDO U2F
Attestation, and Assertion Signatures.
* Refines and corrects the Relying Party registration and authentication
assertion verification operations.
* Clarifies and corrects the Packed, TPM, and FIDO U2F attestation
statement formats.
* Refines the Extensions framework: clarifies the WebAuthn extensions
model regarding passing-through unrecognized extensions, authenticator
extension processing, and the inputs & outputs of defined extensions. Also:
* Clarifies and corrects the FIDO AppID extension.
* Refines and corrects the Location extension.
* Adds the Biometric Authenticator Performance Bounds Extension
(biometricPerfBounds)
* Coalesces Security Considerations section, adds attestation security
considerations. Adds discrete Privacy Considerations section, touching
upon attestation, registration, and authentication privacy.
HTH,
=JeffH
Received on Wednesday, 14 March 2018 21:34:38 UTC