W3C home > Mailing lists > Public > public-webauthn@w3.org > January 2019

Re: [webauthn] Add notion of forbidding resident credential creation (#1149)

From: =JeffH via GitHub <sysbot+gh@w3.org>
Date: Wed, 30 Jan 2019 22:13:38 +0000
To: public-webauthn@w3.org
Message-ID: <issue_comment.created-459131065-1548886417-sysbot+gh@w3.org>
NOTE: some have been thinking that this would be a change to WebAuthn only (no [CTAP](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html)) since this change only affects how the browser selects eligible authenticators for that specific transaction.  

Actually, it is seeming to me that the above claim is not correct -- i.e., that CTAP is indeed also affected and will require changes:

Presently, CTAP only specifies specific behavior for `rk=true`. If `rtk` is false, whether or not we are creating a [client-side resident credential](http://w3c.github.io/webauthn/#client-side-resident-public-key-credential-source), or a [server-side resident cred](http://w3c.github.io/webauthn/#server-side-credential-storage-modality) (aka "server credential"), appears to be implicitly left up to the authenticator.

E.g., present CTAP language is in Step 10 of [ CTAP's authenticatorMakeCredential() operation](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html#authenticatorMakeCredential)

See also the [webauthn language wrt "requiring a resident key":](http://w3c.github.io/webauthn/#dom-authenticatorselectioncriteria-requireresidentkey) ..and also the ["credential storage modality" section](http://w3c.github.io/webauthn/#sctn-credential-storage-modality) whose last paragraph says: 
> Note that a resident credential capable authenticator MAY support both storage strategies. In this case, the authenticator MAY at its discretion use different storage strategies for different credentials, though subject to the requireResidentKey option of create().

..note also that the above-menioned werbauthn language for [requireResidentKey](http://w3c.github.io/webauthn/#dom-authenticatorselectioncriteria-requireresidentkey) says only this: 
> "If the parameter is set to true, the authenticator MUST create a client-side-resident public key credential source when creating a public key credential."

..thus leaving the `requireResidentKey=false` behavior up to the client platform and/or the authenticator (and given present CTAP spec language, it apparently is **_implicitly_** left up to the authnr).

cc: @christiaanbrand 

-- 
GitHub Notification of comment by equalsJeffH
Please view or discuss this issue at https://github.com/w3c/webauthn/issues/1149#issuecomment-459131065 using your GitHub account
Received on Wednesday, 30 January 2019 22:13:40 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 18:59:01 UTC