-
Notifications
You must be signed in to change notification settings - Fork 172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove ECDAA? #1410
Comments
I support removing the ECDAA algorithm. |
Nothing has happened in the Fido2 working group. |
I'll also point out that this working already decided not to register a COSE algorithm identifier for ECDAA, so this is already unusable. (Compare this to the algorithm identifiers that we are registering in https://tools.ietf.org/html/draft-ietf-cose-webauthn-algorithms-05). We should finish removing ECDAA. |
Mike points out that there is no COSE algorithm identifier registered for this so it is not usable anyway. |
* Remove mentions of ECDAA. Fixes #1410 * Remove some other references. (I forgot to search for “ecdaa” in lowercase.)
It was never implemented by browser vendors or authenticator manufacturers, see w3c/webauthn#1410
It was never implemented by browser vendors or authenticator manufacturers, see w3c/webauthn#1410
It was never implemented by browser vendors or authenticator manufacturers, see w3c/webauthn#1410
I was wondering if anything had changed since the PIE blog from August 2018 (Security Concerns Surrounding WebAuthn: Don't Implement ECDAA (Yet)), which also mentions nobody had implemented ECDAA yet so there was time to fix things.
Unless something's happening in FIDO-land where mere mortals like me are not privy to, FIDO ECDAA Algorithm from July 2018 predates the concerns raised in the blog post, so nothing seems addressed.
Unless I'm mistaken, "nobody implemented it" is still the case as well:
Given the recent removal of unimplemented extensions should ECDAA also be removed?
The text was updated successfully, but these errors were encountered: