Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updated PRF Compatibility Section #82

Merged
merged 7 commits into from
Oct 16, 2023
Merged

Updated PRF Compatibility Section #82

merged 7 commits into from
Oct 16, 2023

Conversation

gkatrakazas
Copy link
Contributor

@gkatrakazas gkatrakazas commented Oct 4, 2023

This update introduces refined transport names for clarity and adds a detailed compatibility table for each operating system and browser combination.

In reference to issue #81

PRF Compatibility Support by Operating System and Latest Browser Versions

Operating System Chrome (v116+) Edge Firefox Opera Safari Brave
Linux - -
Windows
MacOS
Android
iOS

PRF Compatibility Scenarios

Operating System Authenticator Transport PRF Compatibility
Linux YubiKey USB
Linux Android Hybrid
Linux iOS Hybrid
Windows YubiKey USB
Windows Android Hybrid
Windows iOS Hybrid
Windows Windows Internal
MacOS YubiKey USB
MacOS MacOS Internal
MacOS Android Hybrid
MacOS iOS Hybrid
Android Android Internal
iOS iOS Internal
iOS YubiKey NFC

Feel free to provide suggestions or improvements.

@gkatrakazas gkatrakazas added the documentation Improvements or additions to documentation label Oct 4, 2023
README.md Outdated

| Operating System | Authenticator | Transport | PRF Compatibility |
|------------------|----------------------|---------------|--------------------|
| Linux | YubiKey | USB | ✔ |
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As an authenticator, any FIDO security key should work, as long as it supports the CTAP hmac-secret extension.
I tested with a Solo key (v1). Perhaps we should also maintain a table with verified authenticators?

See also https://opotonniee.github.io/fido-mds-explorer/ for entries where metadataStatement.authenticatorGetInfo.extensions includes hmac-secret.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If I understand correctly, we should rename the 'YubiKey' to 'Security Key' to make it more inclusive and reflective of various compatible security key models.

As for the new table for verified authenticators, are you suggesting that we should list different security key models that have been tested? This would differ from the current table, which display prf compatibility by OS and authenticator category.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps use the term fido security key for now, and add a comment that any security key should work, provided it supports hmac-secret.

We could also refer to
https://opotonniee.github.io/fido-mds-explorer/
where hmac-secret support is listed under metadataStatement > authenticatorGetInfo > extensions

README.md Show resolved Hide resolved
@gkatrakazas gkatrakazas marked this pull request as ready for review October 10, 2023 10:07
@joostd
Copy link

joostd commented Oct 16, 2023

Looks good to me!

@gkatrakazas gkatrakazas merged commit 40aebd2 into master Oct 16, 2023
@gkatrakazas gkatrakazas deleted the update-readme branch October 19, 2023 15:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants