1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-11 17:08:15 +00:00
trezor-firmware/core/src/apps/webauthn
Pavol Rusnak d8534b5ee6
perf(core/extmod): replace HMAC Python implementation with C
We keep Python implementation of HMAC for Monero in
core/src/apps/monero/xmr/crypto/__init__.py
2020-10-12 16:33:13 +02:00
..
metadata core/webauthn: update metadata 2019-11-16 10:53:10 +00:00
res common/defs/fido: add aws and tutanota 2020-06-05 14:53:13 +02:00
__init__.py core/usb: reorder endpoints 2019-11-13 13:21:39 +01:00
add_resident_credential.py core: wipe before reset and recovery; introduce 'intialized' field 2020-06-16 11:31:29 +02:00
common.py core/webauthn: Implement support for Ed25519 signatures in FIDO2. 2020-03-12 15:45:26 +01:00
confirm.py core: auto-generate list of FIDO known apps 2019-12-09 16:31:46 +01:00
credential.py perf(core/extmod): replace HMAC Python implementation with C 2020-10-12 16:33:13 +02:00
fido2.py perf(core/extmod): replace HMAC Python implementation with C 2020-10-12 16:33:13 +02:00
knownapps.py common/fido: Unify application labeling between U2F and FIDO2. 2020-07-30 15:29:54 +02:00
knownapps.py.mako common/fido: Unify application labeling between U2F and FIDO2. 2020-07-30 15:29:54 +02:00
list_resident_credentials.py chore(core): fix typing and kwargs usage 2020-09-23 16:00:10 +02:00
README.md core/webauth: Update readme with Ed25519 algorithm and certificates. 2020-04-09 21:05:28 +02:00
remove_resident_credential.py core: wipe before reset and recovery; introduce 'intialized' field 2020-06-16 11:31:29 +02:00
resident_credentials.py core/webauthn: rename storage.webauthn to storage.resident_credentials 2019-11-08 12:47:54 +01:00

WebAuthn

MAINTAINER = Andrew R. Kozlik andrew.kozlik@satoshilabs.com

AUTHOR = Andrew R. Kozlik andrew.kozlik@satoshilabs.com

REVIEWER = Jan Pochyla jan.pochyla@satoshilabs.com, Ondrej Vejpustek ondrej.vejpustek@satoshilabs.com


This app implements WebAuthn authenticator functionality in accordance with the following specifications:

Supported features and algorithms

This implementation supports client-side credential storage on the device and user verification by PIN entry, making the Trezor T a first-factor roaming authenticator usable for passwordless login.

User verification

The device is capable of verifying the user within itself by direct PIN entry via the touchscreen. Client PIN is not supported, because it is less secure than direct PIN verification. The authenticatorClientPIN command is therefore implemented only to the extent required by the hmac-secret extension. Namely, only the getKeyAgreement subcommand is supported.

Credential selection

Credential selection is supported directly on the device. The authenticatorGetNextAssertion command is therefore not implemented.

Public key credential algorithms

  • COSE algorithm ES256 (-7): ECDSA using the NIST P-256 curve with SHA-256.
  • COSE algorithm EdDSA (-8): Pure EdDSA using the Ed25519 curve.

Extenstions

  • hmac-secret extension.

Attestation types

  • Basic attestation for login.microsoft.com.
  • Self attestation for all other sites.

AAGUID

The AAGUID is a 128-bit globally unique identifier indicating the type (e.g. make and model) of the authenticator. The AAGUID for Trezor T is d6d0bdc3-62ee-c4db-de8d-7a656e4a4487.

Certificates for basic attestation