-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a list of device IDs we will explicitly block in Web NFC #550
Comments
It could look like as something like this
|
cc @reillyeon |
We should make sure that the fields being matched are well-defined in terms of the NFC specifications. I'm not sure if "historical bytes" is a term from NFC or the Android API. |
So are YubiKeys NFC blocked from Web NFC? |
What is your use case @miguelUS? |
Thanks. My use case is: a customer wants to read a Yubico OTP string (the 44 character string you get from the YubiKey) into a web browser tab (chrome custom tab) and use it as second factor for authentication through NFC. The device is Android. |
Yes. This Blocklist is there to block this kind of attacks. See discussion at #543 (comment) |
We should create a list, similar to the ones in the WebUSB and Web Bluetooth repos, of device IDs we are explicitly blocking. The first ones to be included will be YubiKey devices as raised in #543
Here's the WebUSB blocklist: https://github.com/WICG/webusb/blob/master/blocklist.txt
For info, here's the chromium CL that introduces the blocklist: https://chromium-review.googlesource.com/c/chromium/src/+/2078550
The text was updated successfully, but these errors were encountered: