Password-free authentication – FIDO2 and WebAuthn
Firefox
In early 2018, the developer versions of Firefox introduced support for the authentification process, and the technology is firmly integrated since Firefox 60 [10]. Also, the developers of the Chrome (Google) and Edge (Microsoft) browsers [11] plan to support WebAuthn in the future.
Listings 1 and 2 show JavaScript examples from a post by Mozilla developers J.C. Jones and Tim Taubert [12] that initializes a USB U2F token and requests public keys on the client. All you need is the local hardware (e.g., the USB token or a fingerprint reader).
The navigator.credentials.create()
and decodeCredential
functions of Listing 1 request a new FIDO credential by enabling all compatible devices and keeping them waiting for user input. The credential is created as soon as the user has authenticated successfully. The decodeCredential
function creates a key pair and transmits the public key (in plain text). When generating the key, the URL call and a timestamp link this user, this website, and the authentication. Listing 2 shows the process for an existing credential when the user visits the website again.
Listing 1
Creating a Credential and Keys
01 /* (CC BY-SA 3.0: https://creativecommons.org/licenses/by-sa/3.0/) */ 02 03 const cose_alg_ECDSA_w_SHA256 = -7; 04 05 /* The challenge must be produced by the server */ 06 let challenge = new Uint8Array([21,31,105,<[...]>]); /* 29 more random bytes generated by the server */ 07 08 let pubKeyCredParams = [{ 09 type: "public-key", 10 alg: cose_alg_ECDSA_w_SHA256 11 }]; 12 13 let rp = { 14 name: "Test Website" 15 }; 16 17 let user = { 18 name: "Firefox User firefox@<example.com>", 19 displayName: "Firefox User", 20 id: new TextEncoder("utf-8").encode("firefox@<example.com>") 21 }; 22 23 let publicKey = {challenge, pubKeyCredParams, rp, user}; 24 navigator.credentials.create({publicKey}) 25 .then(decodeCredential);
Listing 2
Querying the Public Key
01 /* (CC BY-SA 3.0: https://creativecommons.org/licenses/by-sa/3.0/) */ 02 03 /* The challenge must be produced by the server */ 04 let challenge = new Uint8Array([42,42,33,<[...]>]); /* 29 more random bytes generated by the server */ 05 06 let key = new Uint8Array(<[?]>); */ Retrieve Key Handle 07 08 let allowCredentials = [{ 09 type: "public-key", 10 id: key, 11 transports: ["usb"] 12 }]; 13 14 let publicKey = {challenge, allowCredentials}; 15 16 navigator.credentials.get({publicKey}) 17 .then(decodeAssertion);
For Developers
The FIDO Alliance developer resources web page [13] proves to be a good starting point for developers, with direct links to the specification and explanations for the protocols, platforms, and functions involved (e.g., the navigator.credentials.get()
and navigator.credentials.create()
functions demonstrated in Listings 1 and 2).
On Android, org.fidoalliance.intent.FIDO_OPERATION
handles all the functions (see chapter 6 of the W3C specification, or chapter 7 for iOS). The Android client API has defined this intent and it comes with a full set of functions for login, registration, and changes. Google's developer resources [14] prove to be just as helpful in the WebAuthn case as those of GitHub, where more and more projects are implementing the functions (e.g., in Python [15] and with YubiKeys).
Yubico tokens appear to be a good choice for a quick start. Both the YubiKey NEO and FIPS support FIDO and are National Institute of Standards and Technology (NIST)-certified for use in safety-critical environments.
Server Side
The FIDO Alliance points to the large number of servers that support FIDO, each of which offers its own configuration procedure. However, the Alliance offers to confer FIDO Universal Server certification [16] on the servers.
Secure Sockets Layer (SSL) is a basic requirement, but without a database – or an LDAP user directory – nothing works right now. Yubico lists the steps necessary for LDAP integration under YubiAuth [17], and the LDAP wiki [18] indicates a starting point for CTAP. A demo project is available on GitHub for FIDO2 servers [19].
« Previous 1 2 3 4 Next »
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.
-
XZ Gets the All-Clear
The back door xz vulnerability has been officially reverted for Fedora 40 and versions 38 and 39 were never affected.
-
Canonical Collaborates with Qualcomm on New Venture
This new joint effort is geared toward bringing Ubuntu and Ubuntu Core to Qualcomm-powered devices.
-
Kodi 21.0 Open-Source Entertainment Hub Released
After a year of development, the award-winning Kodi cross-platform, media center software is now available with many new additions and improvements.
-
Linux Usage Increases in Two Key Areas
If market share is your thing, you'll be happy to know that Linux is on the rise in two areas that, if they keep climbing, could have serious meaning for Linux's future.
-
Vulnerability Discovered in xz Libraries
An urgent alert for Fedora 40 has been posted and users should pay attention.
-
Canonical Bumps LTS Support to 12 years
If you're worried that your Ubuntu LTS release won't be supported long enough to last, Canonical has a surprise for you in the form of 12 years of security coverage.
-
Fedora 40 Beta Released Soon
With the official release of Fedora 40 coming in April, it's almost time to download the beta and see what's new.
-
New Pentesting Distribution to Compete with Kali Linux
SnoopGod is now available for your testing needs
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.