Complete AuthenticatorSelectionCriteria handling |
|||||||||
Issue descriptionImplement the full logic to appropriately filter authenticator types. Particularly relevant now that we are adding support for more than USB U2F devices.
,
Mar 13 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/e457399d3d0c318be2ca9ad661a963f461bb05a1 commit e457399d3d0c318be2ca9ad661a963f461bb05a1 Author: Kim Paulhamus <kpaulhamus@chromium.org> Date: Tue Mar 13 18:46:25 2018 [webauthn] Check userVerification and requireResidentKey Adds the tighter restrictions detailed in https://fidoalliance.org/specs/fido-v2.0-ps-20170927/fido-client-to-authenticator-protocol-v2.0-ps-20170927.html#using-the-ctap2-authenticatormakecredential-command-with-ctap1-u2f-authenticators where: 1) a create() call must not require user verification or resident keys 2) a get() call must not require user verification in order to dispatch to u2f authenticators. Bug: 803832 Change-Id: Ib9cf9d3bcf0b71f0d32fec76f1aaf175278a02ef Reviewed-on: https://chromium-review.googlesource.com/949453 Reviewed-by: Jan Wilken Dörrie <jdoerrie@chromium.org> Reviewed-by: Balazs Engedy <engedy@chromium.org> Reviewed-by: Daniel Cheng <dcheng@chromium.org> Commit-Queue: Kim Paulhamus <kpaulhamus@chromium.org> Cr-Commit-Position: refs/heads/master@{#542870} [modify] https://crrev.com/e457399d3d0c318be2ca9ad661a963f461bb05a1/content/browser/webauth/authenticator_impl.cc [modify] https://crrev.com/e457399d3d0c318be2ca9ad661a963f461bb05a1/content/browser/webauth/authenticator_impl_unittest.cc [modify] https://crrev.com/e457399d3d0c318be2ca9ad661a963f461bb05a1/content/browser/webauth/webauth_browsertest.cc [modify] https://crrev.com/e457399d3d0c318be2ca9ad661a963f461bb05a1/device/fido/u2f_sign.cc
,
Mar 15 2018
Requesting merge to 66 for both CLs in this bug. They add more specific restrictions on the types of requests we permit, otherwise we might allow requests that can't actually be supported by U2F authenticators. Both CLs were verified on Windows Canary.
,
Mar 15 2018
This bug requires manual review: M66 has already been promoted to the beta branch, so this requires manual review Please contact the milestone owner if you have questions. Owners: cmasso@(Android), cmasso@(iOS), josafat@(ChromeOS), abdulsyed@(Desktop) For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Mar 19 2018
What are the implications if we wait until M67?
,
Mar 19 2018
Since M66 has already reached beta, it can probably wait. The current behavior is in M65 behind a flag, and the API will still be behind a flag in M66. It could cause some annoyance to developers while they're developing against the API. If they try using certain combinations of these options, they won't get the correct error when using U2F authenticators. (Realistically, no one should be using these options except in testing scenarios, since they're meant for CTAP authenticators and such devices are not on the market yet).
,
Mar 20 2018
per #6, rejecting merge to M66. Let's target this for 67.
,
Mar 20 2018
SG, thanks.
,
Mar 31 2018
Kim, is there more work on this one, or can we close this now that Issue 823546 is done?
,
Mar 31 2018
Also, what's the urgency on this one?
,
Mar 31 2018
,
Apr 2 2018
Urgency N/A. It's fixed following https://chromium-review.googlesource.com/c/chromium/src/+/989413.
,
Apr 3 2018
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/3eef95f193bc924766a26eeb72f1ed20d58ecef2 commit 3eef95f193bc924766a26eeb72f1ed20d58ecef2 Author: Kim Paulhamus <kpaulhamus@chromium.org> Date: Tue Apr 03 10:37:45 2018 [webauthn] Filter out platform devices for U2F requests. This requirement is derived from clause 5.1.3.19.1 in the spec: "If options.authenticatorSelection.authenticatorAttachment is present and its value is not equal to authenticator’s attachment modality, continue", and the fact that there are no U2F platform devices. This CL also fixes the error message when the all U2F devices are filtered out by the resident key and user verification criteria. While the CL (crrev.com/c/949453) introducing these options correctly documented the intended behavior in a comment in u2f_sign, it did not actually change the DOMException itself. Finally, the CL moves related webauthn tests from credentialmanager_browsertests to webauth_browsertests. Bug: 803832 Change-Id: Ie8f124af3783c2aaec85abd3baac050cfbb926b7 Reviewed-on: https://chromium-review.googlesource.com/989413 Commit-Queue: Balazs Engedy <engedy@chromium.org> Reviewed-by: Vadym Doroshenko <dvadym@chromium.org> Reviewed-by: Balazs Engedy <engedy@chromium.org> Cr-Commit-Position: refs/heads/master@{#547664} [modify] https://crrev.com/3eef95f193bc924766a26eeb72f1ed20d58ecef2/chrome/browser/password_manager/credential_manager_browsertest.cc [modify] https://crrev.com/3eef95f193bc924766a26eeb72f1ed20d58ecef2/content/browser/webauth/authenticator_impl.cc [modify] https://crrev.com/3eef95f193bc924766a26eeb72f1ed20d58ecef2/content/browser/webauth/authenticator_impl_unittest.cc [modify] https://crrev.com/3eef95f193bc924766a26eeb72f1ed20d58ecef2/content/browser/webauth/webauth_browsertest.cc
,
Apr 3 2018
|
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by bugdroid1@chromium.org
, Mar 10 2018