-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Complete the description of the eosio crypto keys K1, R1 and Webauthn #5
Comments
k1 = EcdsaSecp256k1VerificationKey2019 Feedback about webauth: We [EOSIO] do support hardware keys, in particular yubikey. The issue with hardware keys or biometric keys is that there is no "public key" per to use in something static like Json. It will take a challenge from the outside to prove that it is what it's supposed to and then computes the keys internally and passes them back as part of the auth sequence. |
|
the "r1" is indeed the Secp256r1 curve. A bit more here https://crypto.stackexchange.com/questions/18965/is-secp256r1-more-secure-than-secp256k1 |
While Webauthn supports various keys, it seems like the eosio implementation only supports the R1 key. See here Also to support this is that This also may be useful for implementation |
AFAIKT we can therefore use the key prefix in the eosjs implementation to determine the key type:
|
Notes from call wit B1 with @spoonincode and @larryk85 K1 used for most keys PUB_R1_ and PUB_K1_
PUBK_WA_ contains following data:
PUBK_WA_
eosio does not define where the webauthn credential id is stored. this would typically be stored in the server. this is needed for webauthn protocol. no best practice was released by B1. suggest not to put this on-chain but they also didn't see a problem with it. |
After discussing in the meeting today, we decided to go ahead and finished the first draft EOSIO DID spec with the K1 type only. We plan to make an implementation of R1 and WA in the resolver. To close this issue, please finish the K1 key material description. |
Resolved in PR #14 |
No description provided.
The text was updated successfully, but these errors were encountered: