-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pass FIDO2 conformance Server-ServerAuthenticatorAttestationResponse-Resp-5 F-10 test #408
Comments
Related issue: fido-alliance/conformance-test-tools-resources#678 |
This seems to be caused by the way we validate our certificate chain – essentially: store = OpenSSL::X509::Store.new
root_certificates.each do |root_certificate|
store.add_cert(root_certificate)
end
attestation_certificate = attestation_trust_path.first
store.verify(attestation_certificate, attestation_trust_path) For this spec, the root certificate – present in the See root_cert
On the other hand, the See attestation_trust_path
Note that the last certificate in the
However, the chain is in fact valid to
Hence our code treats such I'm not sure about which approach is correct here to be honest. The following paragraph from the RFC 5280 states that self-signed certificates should not be included in the certification path:
Not sure how to proceed with this. |
How to run FIDO2 conformance tests: https://github.com/cedarcode/webauthn-ruby/tree/master/spec/conformance.
The text was updated successfully, but these errors were encountered: