Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add key attestations #389
add key attestations #389
Changes from 2 commits
6da765e
876c29c
feced43
56e26fc
7c0baa3
a96b09b
f5db4bf
6e3a118
64878e0
1932f71
3c15c3c
ef84be4
bfa2a26
8a8dcfd
42de92f
1b98041
23c8762
7735e1c
05aa467
246e083
33612a3
4e6dc79
1f9e94b
1131416
f71e748
4b3c00d
c148e8c
4d803c0
f9cfdba
b004300
638cc52
3c6bb15
02aaaa9
0641305
5677f13
19b7815
e7c882e
00224dc
28f282b
0fc69ef
30f32fc
e71e851
996139e
799b9d3
d840dda
77fe221
e578c84
c20d7f9
beb8ea8
685000b
fcf58f1
2836b82
fce258a
eb8b4ad
a7ef844
7b98544
1a1c620
86a5f83
5b41cf8
af74417
7130e4f
12c59a3
a798e6e
2271601
85ece5c
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Andrea Rock proposes an identifier for the key storage component/WSCD, if there is more than one in the wallet
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is this identifier signed by WSCD trust anchor?
I suppose that we don't have privacy issues in giving the proof of the wscd vendor to the issuer, or do we have?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Isn't that an information that we could get from the key attestation certificate from the key storage/WSCD, if necessary?
I would expect a wallet to already have an internal mapping with identifiers between key attestation jwts and the location where the key resides.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
opened #418
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Without any further information or references, I believe it is almost impossible for a reader to know what
Trusted Execution Environment
orSecure Element
mean. If they are supposed to refer to Android and iOS concepts, should we include explicit references or description.If the OpenID4VCI spec defines these identifiers then it also need to define its meaning in a usable way.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
agree, references are needed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The best reference I was able to find was section 3.3 of ISO 27071 (https://www.iso.org/obp/ui/en/#iso:std:iso-iec:27071:ed-1:v1:en) for the general descriptions and then reference ios (secure enclace) and android (strong box) directly?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As an additional question, what is meant with
secure_element
? Is that an abstraction to unify the Android and iOS concepts (secure_enclave
andstrong_box
)?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would say both secure enclave and strong box are subtypes of a secure element.
In general I would say, a secure element is a security chip/component that provides a secure platform that is capable of securely running applications and storing its confidential data (keys etc).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Trusted Execution Environments are isolated secured processing areas on a common purpose main processor running its own operating system.
Secure Elements usually refers to Common Criteria certified chips that use ISO7816 or ISO14443 from the smartcard industry.
I agree that we would use some references and further explanations for the key types
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i think there were specs for TEE in their own standards body, right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I know this is a rabbit hole but to be even more specific, Secure Elements themselves can also comply to different Common Criteria protection profiles which means they can have different characteristics, i.e., not all of them are equally secure, and some of them don't even comply to any since they didn't perform certification.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@awoie that's correct. That's why the
apr
claim is actually the most interesting one, but for some this is hard to measure and some people will not have the security background to know what it actually means, that's why I put key_storage_type and user_authentication as a more approachable/easy way to describe the key storage component