https://www.nullpt.rs/forging-passkeys
@firstyear @nono2357 Yep. I fail to see the real vulnerability for the common use cases, too.
Additionally, how the user is verified the user at registration (so the user is allowed to register a passkey) is explicitly out of scope of the standard(s). The "attack" of the article could be a regular phishing attack, to, where the attacker just steals the session token to register a new passkey.
Even if a public facing site would perform an attestation, it would not help at all. Attention just attests some security properties, but not does not attest trustworthiness.
Also as long as the enterprise attestation (which is usually limited by the devices) is not used (providing the real serial number, and not just the batch/model AAGUID), an attacker could just relay the registration calls to its local off the shelf Yubikey.
@firstyear @nono2357 In my imagined attack the key would never leave the attacker-controlled remote Yubikey. The user will discover the attack when they try to use their Yubikey on another, non-comprised device.
My point is that on a fully a compromised device, you cannot register securely, and even attestation will not protect me fully.
@firstyear @nono2357 I agree, though I am not sure what could help against full client/browser compromise. At least with a hardware base authenticator (or an off device software based on connected over the hybrid scheme) does not let an attacked extract the authentication secret.
The standard(s) and security guide suggest authenticators should have a display against some attacks, but I believe there are only a handful of authenticators (if any) with it (besides previously mentioned phones as a hybrid one). Security at registration time is only covered by enterprise registration.