FWIW. Years ago I proposed an alternative to QR based on NFC:
https://github.com/w3c/web-nfc/issues/128
Since then NFC fell of the chart for PCs.
I believe lots of existing authentication solutions are vulnerable to the phishing attack described below.
Thanx,
Anders
>> A compromised browser is the least of our worries because if the browser is compromised, *all bets are off*, even if you were to use an actual FIDO-USB Device like a Yubikey or whatever. the only security you could have would be a FIDO-Device with Display such as the Mooltipass or the FIDO-enabled Cryptocoin wallets from several makers who can show you either the rpID itself or, if operating on CTAP1, a prepresentation of the appid hash), but even then a malicious browser could just wait for a moment or make you believe you are actually signing into that specific service instead of just spoofing left right and center.
>>
>> Am Di., 24. Okt. 2023 um 22:11 Uhr schrieb Joshua Zhao <
zhao....@gmail.com>:
>>
>> Hi Tim,
>>
>> You are right that caBLE is implemented by platforms. It's just that sometimes the BLE advertisements are not received, so I wish to avoid unnecessary dependencies if possible.
>>
>> If BLE could work reliably, there would be so much more we can do in utilizing such a communication channel.
>>
>> Thanks,
>> Joshua
>>
>> On Tuesday, October 24, 2023 at 10:48:16 AM UTC-7 Tim Cappalli wrote:
>>
>> The implementation would be simplified quite a bit without the need for the above step when using caBLE. Hence my question.
>>
>>
>> What are you trying to implement? CDA (hybrid) is implemented by platforms/clients. There is nothing that an RP or even passkey provider needs to implement.
>>
>>
>> If we are worried about a compromised browser, wouldn't the malicious code running on it have access to the broadcast message too?
>>
>>
>> If your browser is compromised, all bets are off as TLS is likely also compromised.
>>
>>
>> The reason for such a step is cited as a proximity check when using caBLE. I am having a hard time understanding why this is necessary.
>>
>>
>> The BLE advertisement provides proof of proximity. QR codes offer no proof of proximity. They can be scanned from afar, rendered in a remote session, etc. Realistically nothing that is rendered on a screen, unless the device has no network access, offers any proof proximity.
>>
>> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>> *From:*
fido...@fidoalliance.org <
fido...@fidoalliance.org> on behalf of Joshua Zhao <
zhao....@gmail.com>
>> *Sent:* Tuesday, October 24, 2023 10:39
>> *To:* FIDO Dev (fido-dev) <
fido...@fidoalliance.org>
>> *Subject:* [FIDO-DEV] Is the BLE advertisement message really necessary?
>> When using a smartphone as a roaming authenticator, the phone needs to send out a BLE broadcast advertisement message after scanning the QR code. The reason for such a step is cited as a proximity check when using caBLE. I am having a hard time understanding why this is necessary.
>>
>> By scanning the QR code, isn't it proven that the devices should be right next to each other if the authenticator can read the code embedded in the QR code? What specific threat we are guarding against with the extra broadcast BLE advertisement? If we are worried about a compromised browser, wouldn't the malicious code running on it have access to the broadcast message too? Am I missing something? The documents I can find didn't elaborate on the specifics.
>>
>> The implementation would be simplified quite a bit without the need for the above step when using caBLE. Hence my question.
>>
>> Any insights on this issue would be appreciated greatly.
>>
>> Thanks,
>> Joshua
>> --
>> You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
>> To unsubscribe from this group and stop receiving emails from it, send an email to
fido-dev+u...@fidoalliance.org.
>> To view this discussion on the web visit
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/1341a16f-a250-4e29-8ee6-fe1c12fe4410n%40fidoalliance.org <
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/1341a16f-a250-4e29-8ee6-fe1c12fe4410n%40fidoalliance.org?utm_medium=email&utm_source=footer>.
>>
>> --
>> You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
>> To unsubscribe from this group and stop receiving emails from it, send an email to
fido-dev+u...@fidoalliance.org.
>>
>> To view this discussion on the web visit
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/d1b5c7be-708c-4b32-89ae-d559f6698433n%40fidoalliance.org <
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/d1b5c7be-708c-4b32-89ae-d559f6698433n%40fidoalliance.org?utm_medium=email&utm_source=footer>.
>>
>> --
>> You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
>> To unsubscribe from this group and stop receiving emails from it, send an email to
fido-dev+u...@fidoalliance.org <mailto:
fido-dev+u...@fidoalliance.org>.
>> To view this discussion on the web visit
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/9336b511-5794-49a6-aeff-7e0b90c56bban%40fidoalliance.org <
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/9336b511-5794-49a6-aeff-7e0b90c56bban%40fidoalliance.org?utm_medium=email&utm_source=footer>.
>
> --
> You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to
fido-dev+u...@fidoalliance.org <mailto:
fido-dev+u...@fidoalliance.org>.
> To view this discussion on the web visit
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/AF04831A-CF2A-4E3D-ABA8-26650A288EE9%40gmail.com <
https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/AF04831A-CF2A-4E3D-ABA8-26650A288EE9%40gmail.com?utm_medium=email&utm_source=footer>.