You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In both of the RP Operations subsections (Registering a new cred, and verifying an authn assertion), the step for verifying/processing of extension outputs is placed before the step for verifying the signature value over "authenticator data".
This is fine for idempotent extensions that simply marshall data for eventual return to the RP as a part of the operation's response.
However, extensions such as devicePubKey / "DPK" (PR #1663) call for the RP to associate and store extension-generated data with the user's account. The RP probably should only do so if the overall credential creation or authentication results themselves validate correctly, which notably includes verifying the "encompassing" signature over "authenticator data".
Perhaps the step for verifying extension outputs should be moved to after the step(s) for verifying the "encompassing" signature over "authenticator data" in both of the registering a new cred, and verifying an authn assertion sections.
The text was updated successfully, but these errors were encountered:
I think the concern about devicePubKey is mostly resolved at the moment by the combination of #1807 and #1812, as the steps to store new DPK records are now deferred to after signature verification. But I wonder if in a broader perspective it's still worth moving extension processing to after signature verification anyway, so this doesn't come up again in future extensions - or extensions defined in other specs, for that matter. Thoughts on that? I'm happy to do it in that case.
In both of the RP Operations subsections (Registering a new cred, and verifying an authn assertion), the step for verifying/processing of extension outputs is placed before the step for verifying the signature value over "authenticator data".
This is fine for idempotent extensions that simply marshall data for eventual return to the RP as a part of the operation's response.
However, extensions such as
devicePubKey
/ "DPK" (PR #1663) call for the RP to associate and store extension-generated data with the user's account. The RP probably should only do so if the overall credential creation or authentication results themselves validate correctly, which notably includes verifying the "encompassing" signature over "authenticator data".Perhaps the step for verifying extension outputs should be moved to after the step(s) for verifying the "encompassing" signature over "authenticator data" in both of the registering a new cred, and verifying an authn assertion sections.
The text was updated successfully, but these errors were encountered: