Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extensible data structure for Authenticator Data #1220

Closed
Kieun opened this issue May 17, 2019 · 3 comments
Closed

Extensible data structure for Authenticator Data #1220

Kieun opened this issue May 17, 2019 · 3 comments

Comments

@Kieun
Copy link
Member

Kieun commented May 17, 2019

We have Authenticator Data structure and it includes list of bit flags (1 byte).
We are leaving extra RFUs (4 bits) for future uses and assigning such bits should be considered carefully since we have no enough room.
If we decide to consume one bit for a certain purpose, we should have some ways to indicate that the bit is consumed so that any concerning components (RPs) looks at it and handles it properly.

Before too late, it is better for us to define the way to assign the flags.
One simple way is that we assign the version number for the data structure within the extension if the authenticator supports it.
We have been suffering same problem when handling the resident key feature (#1191).

@equalsJeffH
Copy link
Contributor

Before too late, it is better for us to define the way to assign the flags.
We have been suffering same problem when handling the resident key feature (#1191).

Do you mean to say that during the discussions of the resident key feature (PR #1191), we did consider assigning one of the "Reserved for Future Use (RFU)" flags, and in that discussion we were unsure how to go about about assigning one of the RFU flags for that purpose?

One simple way is that we assign the version number for the data structure within the extension if the authenticator supports it.

I am unsure what you mean here -- perhaps you could provide a worked-out example?

@Kieun
Copy link
Member Author

Kieun commented Jun 12, 2019

Do you mean to say that during the discussions of the resident key feature (PR #1191), we did consider assigning one of the "Reserved for Future Use (RFU)" flags, and in that discussion we were unsure how to go about about assigning one of the RFU flags for that purpose?

Yes. I think we don't have any feasible way to consume the RFU bits.

I am unsure what you mean here -- perhaps you could provide a worked-out example?

In current WebAuthn spec, we don't have any version information. So, from the RP perspective, new flags in Authenticator Data cannot be distinguishable from the old one. For doing this, we should have some distinguishable information like version. E.g., authenticator can return the version information within the authenticator extension that it supports.

@equalsJeffH
Copy link
Contributor

I am thinking that addressing (or not) how we allocate Reserved for Future Use (RFU) authnData.Flags bits for some purpose(s) is better accomplished in FIDO Alliance in CTAP context. Also, it may be the case that given that WebAuthn+CTAP are extensible, and we will never allocate the RFU bits.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants