fido-alliance / iot-fdo-conformance-tools

FIDO Alliances Reference FDO Implementation and Conformance Testing
https://fidoalliance.org/intro-to-fido-device-onboard/
Other
5 stars 2 forks source link

[BUG] Incompatible Hash/HMAC algorithm usage when SECP384R1 attestation type used for owner and device #31

Closed Sai-Anudeep47 closed 1 year ago

Sai-Anudeep47 commented 1 year ago

To simplify issue resolution process, please provide network logs, and or test voucher. to2_client384_hellodevicehash_fail_log.txt

What part of the spec are you testing?

What protocol are having issue with?

Issue description

Log is attached for reference.

yackermann commented 1 year ago

Yeah, that was a typoe. Thx @Sai-Anudeep47

Sai-Anudeep47 commented 1 year ago

Issue is observed now, when SECP256R1 attestation type is used. Conformance owner must dynamically pick algorithm based on attestation type rather than hardcoded algorithm. Including the spec reference again as link present in original comment is not accessible https://tinyurl.com/hashmapping

yackermann commented 1 year ago

@Sai-Anudeep47 sorry but I am confused. Are you talking about ProveDevice64?

Sai-Anudeep47 commented 1 year ago

@herrjemand It is observed when parsing TO2.ProveOVHdr message by client, where it calculates hash of the original TO2.HelloDevice message and compares with hash value present in TO2.ProveOVHdr as mentioned in spec https://tinyurl.com/helloDeviceHash

yackermann commented 1 year ago

Found the issue! Thx @Sai-Anudeep47.

This is now addressed