-
There is a nice PoC for using hmac-secret with the libfido2 tools here: https://gist.github.com/joostd/ef34e52d17bbf546977ff8cfd61f38cd?permalink_comment_id=4885976 The PoC above would require the storage of certain values, like a credential id, assertion challenge and a salt. I do not want to store any of that, I only want to retrieve a hmac-secret that was once registered on the fido2-token without providing anything but the relying party aka domain name that the target secret is associated with. Is this possible? Could I use empty assertion challenge and salt values without violating security? My goal is to use a fido2-token to extract the secret for other applications, by providing nothing but the application name as relying party. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
Hi, The RP ID, hmac-secret salt(s), and Credential ID are required to be able to retrieve a consistent secret. You can omit the Credential ID if you use discoverable credentials. The client data (challenge) should not be stored. Hope this helps, |
Beta Was this translation helpful? Give feedback.
Hi,
The RP ID, hmac-secret salt(s), and Credential ID are required to be able to retrieve a consistent secret. You can omit the Credential ID if you use discoverable credentials. The client data (challenge) should not be stored.
Hope this helps,
Ludvig