Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Requirements for attestation for DPK #1799

Closed
keikoit opened this issue Sep 10, 2022 · 3 comments
Closed

Requirements for attestation for DPK #1799

keikoit opened this issue Sep 10, 2022 · 3 comments

Comments

@keikoit
Copy link

keikoit commented Sep 10, 2022

Based on discussions with various RPs as well as system integrators for RPs, here are the requirements for attestation for DPK (device-bound public key).

 If DPK is supported, 
         1. an attestation statement shall be included, and
         2. the attestation shall be protected from replay attacks

Replay attack protection may be achieved by such a way like including RP-challenge in DPK signature. Using clientDataHash will enable the protection with a minimum extension from the current draft specification.
Without replay attack protection, DPK is equivalent to a bearer token. RPs who need DPK cannot trust such DPK and DPK will not be so useful for RPs.

Related issue: #1798

@kkoiwai
Copy link

kkoiwai commented Sep 12, 2022

My understanding is that at the TPAC in 2022-9-13, we confirmed that DPK is replay-protected as DPK signs over clientDataHash in the current PR1663, yet it is unclear.
I suggest to close this issue after the PR is modified to make it clear.

@agl
Copy link
Contributor

agl commented Sep 21, 2022

I believe the comments on #1663 have been addressed with a clarifying note, thus closing this issue as suggested.

@agl agl closed this as completed Sep 21, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants