-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Passkeys (experimental) #4234
base: main
Are you sure you want to change the base?
Passkeys (experimental) #4234
Conversation
When I'm running the frontend tests locally, they're only rendering error pages and I don't know why. Would appreciate some pointers as to what I'm missing. Either way, in the meanwhile @sandhose could we request for the designs? |
@tonkku107, I only grokked the code; but it appears you plan to be storing a 16-byte identifier for the challenges. I'm not aware of the memory requirements, but Footnotes
|
Some quick comments pertaining to
Longer comment: Origin validation is "complex" in that it's not particularly possible to support all the possible cases "out of the box". To fully empower downstream code,
A few examples that will fail origin validation when
Examples that will succeed:
In summary if this is too relaxed, too strict, or both for your needs; then you have no choice but to define your own type that parses |
Storing in memory won't be an option since multiple instances can be run at once.
I've added an Ulid to be consistent with the rest of the stuff in this project. There's actually only 10 bytes of entropy within the ID as Ulids reserve 6 bytes for a timestamp.
Yeah I know and I wasn't a big fan of that and ultimately moved it out to be more explicit about the weird type stuff going on.
I used JSON or strings wherever I could, but if database efficiency is a concern to the maintainers (which I doubt given my 60GB synapse DB full of JSON strings), that could be changed.
Can you even get any of those examples out of a browser? 😄 |
The code is probably OK. My comments were isolated to Since we are here, there is one more point I do think is important to make and that is related to the CBOR-parsing that happens internally. I strictly adhere to CTAP2 canonical CBOR encoding form. For the most part this is fine and is technically required by the spec; however there have been real-world cases where implementations violate it. For example, there was a time Firefox was not correctly encoding the I think most browsers correctly do it now though, so I haven't experienced issues in my tests. It's something you may want to be aware of though. Perhaps the bigger problem though is the CBOR-decoding that is done in |
|
I use
Did not notice that as I was looking for the serialization impls. The metadata is quite useless anyway. |
Adds support for passkeys behind an experimental config option.
Includes:
Does not include (will probably have to be separate PRs later):
Can be reviewed commit per commit.
Frontend is hacked together from existing components pending designs.