Le lundi 9 novembre 2015 18:29:20 UTC+1, Michael Schwartz (m...@gluu.org) a 
écrit :
> Hi guys... if you need a FIDO U2F server to test against, the Gluu Server has 
> endpoints built in. Its really easy to deploy on Ubuntu / Centos: 
> http://www.gluu.org/docs/admin-guide/deployment/
> 
> Also, I recorded a geeky video on how to test FIDO U2F: 
> http://gluu.co/fido-u2f
> 
> Basically, check enable, change the default authn mechanism... and you're 
> done. Its really easy.
> 
> - Mike

Hi, you did an amazing work with Gluu (insert bowing smiley here).

FIDO U2F kind of recommends to use TLS Channel binding as a protection against 
SSL proxy and other MITM attacks. Chrome FIDO U2F client part is compatible 
with this but it can only be used if the server side is implemented, do Gluu 
support that ?

Search "Channel Binding" inside 
https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-glossary.html
 
and again here 
https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-security-ref.html
 

That's a great -nearly perfect- existing solution, and IMHO Firefox should 
probably implement this feature too for better security and for better 
compatibility with servers that are implementing the server side (like google 
servers). 

http://tools.ietf.org/html/draft-balfanz-tls-channelid-01 
http://www.ietf.org/rfc/rfc5056.txt 
http://www.ietf.org/rfc/rfc5929.txt
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to