Description
draft-ietf-jose-fully-specified-algorithms has received "IANA OK" and thus seems close to finalized. We should update the defaults, recommended algorithms and examples to use these new identifiers as the COSE algorithm identifiers -7 (ES256) and -8 (EdDSA) are now deprecated ("replacement functionality SHOULD be utilized in new deployments in preference to the deprecated identifier").
Proposed Changes for WebAuthn L3
Moved to:
Proposed Changes for WebAuthn L4
Update requirements on clients to support the new values. Advise RPs that -9 (ESP256) could appear in fido-u2f
attestation statements.
-
§5.1.3. Create a New Credential - PublicKeyCredential’s [[Create]](origin, options, sameOriginWithAncestors) Internal Method: add -9 (ESP256) before -7 (ES256) in default
pubKeyCredParams
:If pkOptions.pubKeyCredParams’s size
is zero- Append the following pairs of PublicKeyCredentialType and COSEAlgorithmIdentifier values to credTypesAndPubKeyAlgs:
- public-key and -7 ("ES256").
- public-key and -257 ("RS256").
- Append the following pairs of PublicKeyCredentialType and COSEAlgorithmIdentifier values to credTypesAndPubKeyAlgs:
-
§5.2.1.1. Easily accessing credential data: add -9 (ESP256) and -50 (Ed25519) as required supported algorithms (not for WebAuthn L3, but should be included in L4):
User agents MUST be able to return a non-null value for getPublicKey() when the credential public key has a COSEAlgorithmIdentifier value of:
-
§8.6. FIDO U2F Attestation Statement Format signing procedure: add -9 as a possible alg value:Signing procedure
If the credential public key of the attested credential is not of algorithm -7 ("ES256"), stop and return an error.