I'm no longer directly involved with the FIDO Alliance, so I can't speak to the 
FIDO 2.0 timelines, but my general experience there plus at the W3C tells me 
that it will some time before the new APIs stabilize.  I hope that this won't 
dissuade Mozilla from beginning work on implementing U2F more-or-less 
immediately.

1) Much of the work involved is in building the USB transports (the crypto is 
rather simple) and that code will likely be highly reusable for 2.0 APIs.

2) There is a growing set of services adopting U2F today, a robust and 
competitive market for the hardware, and Firefox support would be a important 
contributor to "critical mass" for the FIDO approach, regardless of the 
particular version.  A privacy-friendly, strong and origin-bound authentication 
mechanism, based on open protocols, with hardware chosen by the user, seems to 
fit very well within the general values and vision of Mozilla.  I think it is 
valuable to give it momentum at a time when alternative approaches that don't 
respect user privacy or the web security model in the same way are being 
heavily pushed.

3) I think it would be OK to leave out Channel ID support as the approach is 
clearly being deprecated and it represents only a tiny fraction of the value 
provided by U2F.

cheers,

Brad Hill
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to