Closed TimWolla closed 2 years ago
And yes, I noticed the warning during the upgrade:
Warning: This is is major update and it could risk breaking any current credentials on your key.
The release notes however do not note explicitly that existing credentials will stop working.
Thanks, will add to the release notes. You'll need to re-register your key that you updated.
@conorpp Thank you for the feedback. Just to confirm:
You'll need to re-register your key that you updated.
Does this mean that this comment in the source code is not accurate:
Or am I looking in the wrong place and that file does apply to something else?
@TimWolla I guess this is only for the device-stored keys. Most auth flows will use dynamically generated keys that are not stored on the key but can be re-created on demand given the same set of data every time. In this case those won't work, because the generation algorithm was changed.
I guess this is only for the device-stored keys.
The beginning of the comment appears to disagree:
Most auth flows will use dynamically generated keys that are not stored on the key but can be re-created on demand given the same set of data every time.
Indeed. And the comment implies that the keyhandle for the Solo2 is an encrypted serialized blob. So it's not so much a generation algorithm, but deserialization instead. My understanding is that it was planned that deserialization simply ignores the extra fields that were included in the previous version based on the comment in line 231.
After updating my Solo2 to firmware 2:20220822.0 (2.964.0) any existing FIDO 2 credentials are no longer working. e.g. when attempting to sign into GitHub (with Firefox on Linux), Firefox reports back
InvalidStateError
during authentication (which indicates an unknown key to the best of my knowledge).