webauthn icon indicating copy to clipboard operation
webauthn copied to clipboard

Use aPAKE/OPAQUE for FIDO multi-device credentials (PassKey)

Open Sebastian-Elfors-IDnow opened this issue 3 years ago • 2 comments

The OPAQUE Asymmetric PAKE Protocol has recently been published by the IETF Network Working Group.

In particular, the section "Client Credential Storage and Recovery" is interesting, because that part specifies how a client can encrypt its private key in an envelope and store it on the server together with the server's public key. The user uses a PIN-code to encrypt the envelope that is then stored at the server. The client can thus download its envelope and decrypt it with a PIN-code. The recovered private key can then be stored in the mobile's TPM/TEE. Furthermore, the client can use the server's public key to authenticate to the server and to create a session key.

This could perhaps be a standardized option for roaming of FIDO multi-device credentials (PassKey)? Perhaps it can be mentioned as an implementation example (or similar) in the WebAuthn standard?

Sebastian-Elfors-IDnow avatar Jun 15 '22 08:06 Sebastian-Elfors-IDnow

I don't believe there would be any changes in WebAuthn to support this. It would be all authenticator side. passkeys are just regular old WebAuthn credentials from the perspective of the WebAuthn specification.

I would suggest bringing this up at a future FIDO plenary BoF session.

timcappalli avatar Jun 28 '22 19:06 timcappalli

Thanks for your insights and recommendations, Tim. I'll keep in mind to propose this as a BoF session at a FIDO plenary.

Sebastian-Elfors-IDnow avatar Jun 29 '22 06:06 Sebastian-Elfors-IDnow

From WG call 2023-02-08: Looks like no further action is needed here.

emlun avatar Feb 08 '23 21:02 emlun