-
Notifications
You must be signed in to change notification settings - Fork 236
Description
Is there a specific reason the document defines that
Let PRF be a pseudo-random function whose outputs are exactly 32 bytes long, selected uniformly at random from a set of at least 2^256 such functions. The choice of PRF MUST be independent of the state of user verification. The selected PRF SHOULD NOT be used for other purposes than implementing this extension. Associate PRF with the current credential for the lifetime of the credential.
(emphasis mine)
it seems like an easy way to gain the PRF's output from a short contact with the authenticator, solely by having the credential ID, which is near-public anyway as they are given out by the RP solely by knowledge of a user identtifier for said RP, and the input (given out by the RP to actually do the authentication anyway)
considering PRF outputs are supposed to be used for en/decrypting data potentially present on a device already, I'd say this would significantly weaken the assurances you can give a PRF.