-
-
Notifications
You must be signed in to change notification settings - Fork 190
FIDO Conformance Tools v1.7.15 fixes #456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
944f168
b700a2f
2b2382b
13d2a3c
3432820
3113ee8
c55c799
7534243
40a68e7
cfaa1f9
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,7 +20,12 @@ public sealed class AuthenticationExtensionsClientInputs | |
/// </summary> | ||
[JsonPropertyName("appid")] | ||
[JsonIgnore(Condition = JsonIgnoreCondition.WhenWritingNull)] | ||
public string AppID { get; set; } | ||
public string AppID { private get; set; } | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Why did you put the getter private and add a method to retrieve the value of the app id? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. All these private getters are used to prevent serialization in response. AppId and Uwm were not welcome by some asserts in the test tool. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Same here @aseigler -- Not sure about this change. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The attribute There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. According to the conformance test tool, AppID should not be part of the response at all. There is a specific testcase for this. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The Fido guys are only slowly following the RFC, the token binding is a good example for this. I had to put it back to pass their tests. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do you have a private branch with a bunch of tweaks that you are running this on? I don't see how you are possibly legitimately passing these without heavy changes and special workarounds. One of the fundamental issues with the way the tool works is the tests are a simple pass/fail -- which sounds simple on the surface, but for the failure case you actually have to be failing for the right reason, which you can only verify (in my experience) by menu -> open inspector and watching the responses to make sure they all line up with the appropriate test ![]() There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think everything is public in my fork and you should use the "net-standard-conversion" branch. I have ported the state of this .net core pull request and I readded your tokenbinding implementation. "which you can only verify (in my experience) by menu -> open inspector" There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. That branch definitely looks like it is passing everything legitimately. Agree with your assessment in the value. I wouldn't mind trying to get the implementation certified if some organization wanted to sponsor it. I think we broke some of the FIDO tests implementing new WebAuthn features and moving away from the third party ASN.1 and CBOR libraries we were using. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I have pushed a few changes to this branch to reach 100%. |
||
|
||
public string GetAppID() | ||
{ | ||
return AppID; | ||
} | ||
|
||
/// <summary> | ||
/// This extension enables the WebAuthn Relying Party to determine which extensions the authenticator supports. | ||
|
@@ -36,7 +41,7 @@ public sealed class AuthenticationExtensionsClientInputs | |
/// </summary> | ||
[JsonPropertyName("uvm")] | ||
[JsonIgnore(Condition = JsonIgnoreCondition.WhenWritingNull)] | ||
public bool? UserVerificationMethod { get; set; } | ||
public bool? UserVerificationMethod { private get; set; } | ||
|
||
#nullable enable | ||
/// <summary> | ||
|
Uh oh!
There was an error while loading. Please reload this page.