-
-
Notifications
You must be signed in to change notification settings - Fork 277
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move certs and lock to data #331
Conversation
@@ -745,16 +741,21 @@ uint8_t ctaphid_custom_command(int len, CTAP_RESPONSE * ctap_resp, CTAPHID_WRITE | |||
|
|||
case CTAPHID_GETVERSION: | |||
printf1(TAG_HID,"CTAPHID_GETVERSION\n"); | |||
wb->bcnt = 3; | |||
wb->bcnt = 4; | |||
ctap_buffer[0] = SOLO_VERSION_MAJ; | |||
ctap_buffer[1] = SOLO_VERSION_MIN; | |||
ctap_buffer[2] = SOLO_VERSION_PATCH; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Correct me if I am wrong, but I believe any site can call this command. Is it button-guarded? If not, then it would be nice to add such user confirmation to avoid providing additional data for fingerprinting.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Websites cannot issue HID commands through FIDO API. It is potentially additional info for fingerprinting. It's main use is to silently tell if the device needs a firmware update, so requiring a button press would hamper the UX. I'm for keeping it silent.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's move the further conversation to #339.
This update fully separates the "hacker" and "secure" state differences to not be compiled into the application, and stored as separate data. So builds after this point do not need to be separated into "secure" and "hacker builds. The main motivation for this is to simplify the update procedure.
The bootloader, however, is unchanged. It needs to have two separate builds for checking signatures or not, which is fine since it's not included in the Solo update.
Two main changes to make this work:
To pair with these changes, the "bundle" builds will be configured to store the certificate and lock information, WIP.