Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Passkeys: non deterministic Eddsa, key not compressed #3

Open
rdubois-crypto opened this issue Aug 15, 2024 · 0 comments
Open

Passkeys: non deterministic Eddsa, key not compressed #3

rdubois-crypto opened this issue Aug 15, 2024 · 0 comments

Comments

@rdubois-crypto
Copy link

When creating a passkey with eddsa params, it appears that the algorithm is not properly implemented.
-> same challenge get different responses (RFC8032 is deterministic, as opposed to ECDSA)
-> KEY is twice long (as P256)

Everything seems to indicate that it is in reality P256 that is used, and that algoID is not checked.
(related to #2).

This is a security issue cause if another device implements Ed25519 properly, it will fail to have a backup in case of device loss in the Samsung.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant