-
Notifications
You must be signed in to change notification settings - Fork 172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authenticator selection extension - should makeCredential fail if no specified authenticator can be found? #227
Comments
The rationale was to make sure that the user gets prompted by some authenticator in order to know that someone is trying to figure out what authenticators are present on that machine. So this don't fail but use other authenticator was intended as a privacy features as we heardprivacy complaints about a more generic authenticator discovery feature before (which it would be in the case of returning a silent error code if the preferred authenticator is not present). |
Should we have to include an extension in ClientData that indicates which authenticator is selected during the client processing? |
@sangraecho no, this is expected to be figured out from the attestation which does include the AAGUID. See #152 for why this cannot be in the ClientData. |
@gmandyam please give proposal or close |
@gmandyam will submit some additional client extensions that address some of your other open issues |
I think the privacy consideration about silent authenticator discovery is obsolete now that makeCredential, with hot-plugging, will always wait for timeout instead of failing early (#655, #687). So maybe we can let this extension fail the operation (i.e., just ignore the authenticator and keep waiting) instead of proceeding with a non-eligible authenticator. |
on 6-Dec-2017 webauthn call: we decided this is likely overall a non-issue presently and we want to allow impls and deployments to experiment in this space and we are punting this issue to L2 such that we can re-consider after we have more experience |
we discussed on call today and decided to close it as this seems to be a non-issue given the 1.5 yrs of experience since we re-visited it. |
In https://w3c.github.io/webauthn/#extension-authenticator-selection the current text says that if the client cannot find any willing-and-able authenticator with one of the specified AAGUIDs, then it must just go ahead and use another authenticator. However in working through use cases it seems unlikely that such an authenticator will ever be acceptable to an RP that cared deeply enough to specify this extension. Of course a client can always ignore extensions, but it seems like a client that supports this extension could provide a better UX by failing out in this case (though maybe after waiting a bit so as not to enable fingerprinting of the client).
The text was updated successfully, but these errors were encountered: