Hi,

thanx for the answer.

Quoting Dirk Balfanz (one of the TLS Channel ID specifications author, a few 
days ago on FIDO DEV forum):

"the new spec that replaces ChannelID is called "Token Binding", and is in the 
process of being standardized by the IETF 
(https://datatracker.ietf.org/wg/tokbind/documents/).

It turns out that as far as FIDO is concerned, a Token Binding key or a 
ChannelID key are really the same thing: it's a public key that will be 
included in the client data and signed by the Authenticator. So while you're 
correct in pointing out that it's a bit weird that FIDO should reference a 
non-standard, other than changing a few words here and there I don't expect any 
changes to the FIDO specs once the Token Binding drafts have become standards."

Source : 
https://groups.google.com/a/fidoalliance.org/d/msg/fido-dev/hn_T6pKS0wU/aEO29oIeEAAJ

I am still concerned about Mozilla Foundation deciding not to implement this 
protection inside Firefox for two main reasons.

1) From a security architect perspective. This is an official recommendation 
that makes sens to prevent MITM attacks. FIDO U2F was created to 
minimize/eliminate that kind of risk. This would rather be a more secure 
decision to fully implement the best options. (I am working for a FIDO U2F 
device manufacturer and that's what we did on our side). I know this protection 
could sound like a oh-not-again-Google initiative, but it is rather efficient 
and it is not very complex to implement (it is mostly about returning a TLS 
related Channel ID public key used by the browser to communicate with the 
server...) and is very close of future "Token Binding" thing.

2) Firefox users could be discriminated out of servers implementing this 
protection. Even if this is mostly/only the case on Google authentication 
servers now, this would already make a difference. I am not a Google fan boy 
-and I am working with other online services to integrate FIDO U2F technology- 
but protecting their services accounts is often what everyone is thinking about 
now when discussing FIDO U2F (protecting Gmail, Gdrive, Youtube, or whatever 
Google related accounts). Did you speak with Google team guys to know if they 
will let Firefox be compatible with their FIDO U2F second factor option even 
without ChannelID protection on the client side? (this would mean that they'll 
accept to lower their security to make it compatible to Mozilla/Firefox 
implementation... They can decide that, even if questionable...)

Regards
--
Fred

On Monday, February 8, 2016 at 5:28:37 PM UTC+1, Eric Rescorla wrote:
> On Fri, Feb 5, 2016 at 3:22 PM, Fred Le Tamanoir 
> wrote:
> 
> > Hi,
> >
> > Great news about you making progress on this !
> >
> > Since I read here and there that you are working with Firefox & Chrome U2F
> > support consistency in mind, what's your take on TLS Channel ID (Token
> > Binding) support inside Firefox ?
> >
> > It is a recommended feature for FIDO U2F client (Firefox here) inside
> > official specifications for additional protection against MITM attacks...
> > and it is implemented on Google authentication servers (and on Chrome
> > client side of course). I don't know if Google team will make it mandatory
> > for non-Chrome browsers to be compatible with their own authentication
> > servers but anyway, I think this is an important issue to be discussed...
> >
> 
> See:
> https://groups.google.com/d/msg/mozilla.dev.platform/IVGEJnQW3Uo/o9WzWgEqCwAJ
> 
> We're not likely to implement Channel ID, but we probably will implement
> Token Binding
> when it seems sufficiently stable
> 
> -Ekr
> 
> 
> 
> >
> > ...and my personal point: we need this :)
> >
> > On Thu, Feb 4, 2016 at 10:49 PM, J.C. Jones <jjo...@mozilla.com> wrote:
> >
> > > All,
> > >
> > > We're making progress on implementing FIDO U2F in Firefox. The effort is
> > > split into a number of bugs at present. First, a quick rundown of where
> > we
> > > are:
> > >
> > > * The tracking bug for U2F support is Bug 1065729.
> > > * Bug 1198330 is to implement USB HID support in Firefox.
> > > * Bug 1231681 implements the WebIDL and the outline of the JS API. This
> > > bug's code is in review.
> > > * Bug 1244959 completes the AppId/FacetId algorithm.
> > > * Bug 1245527 implements the state machines (USBToken) between the JS API
> > > and the USB HID support.
> > > * Bug 1244960 expands an NSS-based U2F token (NSSToken) for expanded
> > > integration and developer testing.
> > >
> > > A couple of notes/clarifications about how we're planning to build U2F
> > > support:
> > >
> > > * The `window.u2f` API endpoint will only be available to code loaded
> > from
> > > secure origins, in keeping with our policy for new features [1]. (This is
> > > also consistent with U2F support that is built into recent versions of
> > > Google Chrome.)
> > > * We are implementing the high-level JavaScript API version 1.1. The
> > > specification for v1.1 is not yet published, but is already implemented
> > in
> > > recent versions of Chromium [2].
> > > * For the time being, U2F support will be gated behind preferences and
> > > disabled by default.
> > >
> > > [1]
> > >
> > https://blog.mozilla.org/security/2015/04/30/deprecating-non-secure-http/
> > > [2]
> > >
> > https://chromium.googlesource.com/chromium/src/+/master/chrome/browser/resources/cryptotoken/webrequest.js
> > >
> > > - J.C.
> > >
> > >
> > > On Wed, Jan 27, 2016 at 2:44 AM, Frederic Martin
> > > > wrote:
> > >
> > >> <http://w3c.github.io/websec/web-authentication-charter>Nearly two
> > >> months since that post...
> > >> Any news on this ?
> > >>
> > >> a) on Mozilla Foundation joining FIDO Alliance?
> > >> b) on FIDO U2F implementation inside Firefox Core?
> > >>
> > >> Thanx.
> > >> _______________________________________________
> > >> dev-platform mailing list
> > >> dev-platform@lists.mozilla.org
> > >> https://lists.mozilla.org/listinfo/dev-platform
> > >>
> > >
> > >
> > _______________________________________________
> > dev-platform mailing list
> > dev-platform@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-platform
> >
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to