THALES GROUP LIMITED DISTRIBUTION to email recipients
Hi My1,
We’ll need more details on this topic. What you describe, as I understand, :
Best regards,
|
|
Thomas Duboucher (he/him) |
Embedded Security Specialist |
Digital Identity and Security Thales |
|
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
[email protected].
To view this discussion visit
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/CACHSkNpX3u_rKyOtg0z%2BjJaPbqfS-eZpxdk_sLpvOk_Rw7%3DJyg%40mail.gmail.com.
Interesting question.On the topic of the Yubikey Bio Multioprotocol, those are subscryption only devices where Enterprises ordering them are made aware of the diffrences between these and the regular 5 series.The keys do support the authenticatorReset (0x07) as expected when only configured with Fido credentials.If the user or admin provisions a PIV certificate on the device, it then returns CTAP2_ERR_OPERATION_DENIED until all the PIV card slots are empty.
At that point, the PIV configuration software or Yubico Authenticator are the only things that can reset it using CCID commands.
I will try to attach a screenshot of the warning.In CTAP2.1 we made reset over some transports optional. That had the side effect of making the command required on at least one.At the time, I was not thinking about devices that had their own UX, and the ones in the working group did not mention it.In principle I would agree that a user, through some action, should be able to disable resetting from the 0x07 command if they have another way to reset.
For a device with a display, I would hope some dialogue could be displayed on device before returning sucess or denied.
For non-display devices, perhaps a new error saying a vendor tool or local UX needs to be used. Perhaps CTAP2_ERR_OPERATION_DISABELED might be enough.Those could be added to CTAP2.3. I can look at doing a pull request.Backing up the authenticator state/ master secret is a separate issue. I think that could be allowed for certification if the credentials are marked as Backup Eligible/ Backed up.Both of those should go to the Fido2 TWGOn a side note, it would be nice if managing security keys was supported on more platforms and not deeply hidden from users, on the platforms it is supported.I suspect that most users use a vendor tool to do a reset because they can't find it in the browser or platform.John B.
That could go in getInfo. Like the link for the pin complexity explanation.
Interesting question.On the topic of the Yubikey Bio Multioprotocol, those are subscryption only devices where Enterprises ordering them are made aware of the diffrences between these and the regular 5 series.The keys do support the authenticatorReset (0x07) as expected when only configured with Fido credentials.If the user or admin provisions a PIV certificate on the device, it then returns CTAP2_ERR_OPERATION_DENIED until all the PIV card slots are empty.
At that point, the PIV configuration software or Yubico Authenticator are the only things that can reset it using CCID commands.
I will try to attach a screenshot of the warning.In CTAP2.1 we made reset over some transports optional. That had the side effect of making the command required on at least one.At the time, I was not thinking about devices that had their own UX, and the ones in the working group did not mention it.In principle I would agree that a user, through some action, should be able to disable resetting from the 0x07 command if they have another way to reset.
For a device with a display, I would hope some dialogue could be displayed on device before returning sucess or denied.
For non-display devices, perhaps a new error saying a vendor tool or local UX needs to be used. Perhaps CTAP2_ERR_OPERATION_DISABELED might be enough.Those could be added to CTAP2.3. I can look at doing a pull request.Backing up the authenticator state/ master secret is a separate issue. I think that could be allowed for certification if the credentials are marked as Backup Eligible/ Backed up.Both of those should go to the Fido2 TWGOn a side note, it would be nice if managing security keys was supported on more platforms and not deeply hidden from users, on the platforms it is supported.I suspect that most users use a vendor tool to do a reset because they can't find it in the browser or platform.John B.
On Monday, June 30, 2025 at 10:26:04 AM UTC-7 My1 wrote:
Good morning here