Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Complete attestation verification support #280

Closed
wants to merge 19 commits into from

Conversation

grzuy
Copy link
Contributor

@grzuy grzuy commented Oct 31, 2019

closes #66
closes #170
closes #175

bdewater and others added 13 commits August 20, 2019 20:15
Implements most of https://fidoalliance.org/specs/fido-v2.0-rd-20180702/fido-metadata-service-v2.0-rd-20180702.html

Interestingly the MDS server currently does not correctly implement the
standard; TOC entry hashes for statements are padded base64url while they should
be unpadded. The conformance server however uses unpadded encoding correctly.
With this commit, all the metadata server tests in the FIDO conformance tools pass
…icate trustworthiness

Hat-tip to Alex Seigler for pointing me to https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-install-trusted-tpm-root-certificates
Downloaded version of TrustedTpm.cab has "22-May-2019" as last changelog entry.
Verify TPM attestation certificate trustworthiness
@grzuy grzuy changed the title Attestation trustworthiness verification Complete Attestation verification support Oct 31, 2019
@grzuy grzuy changed the title Complete Attestation verification support Complete attestation verification support Oct 31, 2019
Facundo & Gonzalo and others added 6 commits October 31, 2019 16:47
… on Metadata::Statement

This allows ActiveSupport::Cache instances to be easily configured for WebAuthn.configuration.cache_backend
Lazy load X509::Certificates instead of during parsing/setting values on Metadata::Statement

module WebAuthn
module Metadata
class Client
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the record: #208 (comment).

@grzuy
Copy link
Contributor Author

grzuy commented Nov 27, 2019

Closing in favor of #283

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants