Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DRAFT: Backup eligibility parameter during registration #1744

Closed
wants to merge 1 commit into from

Conversation

emlun
Copy link
Member

@emlun emlun commented Jun 9, 2022

Brainstorm idea for #1739. This is meant to facilitate discussion, not a fully-formed proposal.

Something like this would enable the client to optimize the user interaction to increase the chance that the registration completes successfully. I note in #1714 (comment) that since we now have the BS and BE flags in the authenticator data, that to me signals that this is a significant credential property that there should perhaps be a feature toggle for.

However the argument against (again, see #1714 (comment)) is that we don't want RPs to see this as a "make it more secure" parameter and just set it to "forbidden" without further consideration. So in order to respect the interests of the user, this proposal allows the client to let the user override the RP's preference if desired.

Perhaps something like this could be a reasonable middle-ground? Is the risk of ecosystem fragmentation still too great? Is it not powerful enough to be useful to RPs? Discuss!


Preview | Diff

@sbweeden
Copy link
Contributor

This type of signal definitely addresses the semantics of what I was asking for in #1739. Attested DPK might also, so I'm not ruling that out just yet. In fact a request with the flag in this proposal could be satisfied by returning the device-bound component in an attested DPK extension response.

<xmp class="idl">
enum BackupEligibilityRequirement {
"forbidden",
"discouraged",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think discouraged and preferred are a bit useless here, since they are wishy-washy. Why would I "discourage" it and how is that different to "any"? I think forbidden, any and required are the only three options we need. 'any' being "let the user decide".

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, that's certainly one of the things to discuss here. But before we dive into details on the design, I'd like to hear whether browsers would be interested in supporting something like this at all.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see why browser should dictate a feature that is required for RP's to actually work and enforce policy ....

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is net new. Pre-multi-device credentials, an RP does not know the properties of the authenticator until after the registration ceremony.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That doesn't mean we can't change this to have a better user experience. For a user to "register" a device and be sent "errors" about their device being ineligible is not a positive experience. Instead we should create a scenario where we guide the UX to only show authenticators that are "very likely" to succeed.

@Firstyear
Copy link
Contributor

This needs strong use cases related to understand what RP's want here with relation to not just backup elligibility, but also attestation. See #1720 (comment)

@emlun
Copy link
Member Author

emlun commented Jul 13, 2022

On 2022-07-13 WG call: the purpose of this PR was to stimulate discussion, and the discussion seems to have died out for now; closing.

@emlun emlun closed this Jul 13, 2022
@emlun emlun deleted the issue-1739-backup-eligible-parameter branch July 13, 2022 19:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants