package metadata import ( "bytes" "crypto" "crypto/x509" "encoding/base64" "encoding/json" "errors" "io/ioutil" "net/http" "github.com/cloudflare/cfssl/revoke" "github.com/mitchellh/mapstructure" uuid "github.com/satori/go.uuid" jwt "github.com/golang-jwt/jwt/v4" ) // Metadata is a map of authenticator AAGUIDs to corresponding metadata statements var Metadata = make(map[uuid.UUID]MetadataTOCPayloadEntry) // Conformance indicates if test metadata is currently being used var Conformance = false // AuthenticatorAttestationType - The ATTESTATION constants are 16 bit long integers indicating the specific attestation that authenticator supports. type AuthenticatorAttestationType uint16 const ( // BasicFull - Indicates full basic attestation, based on an attestation private key shared among a class of authenticators (e.g. same model). Authenticators must provide its attestation signature during the registration process for the same reason. The attestation trust anchor is shared with FIDO Servers out of band (as part of the Metadata). This sharing process shouldt be done according to [UAFMetadataService]. BasicFull AuthenticatorAttestationType = 0x3E07 // BasicSurrogate - Just syntactically a Basic Attestation. The attestation object self-signed, i.e. it is signed using the UAuth.priv key, i.e. the key corresponding to the UAuth.pub key included in the attestation object. As a consequence it does not provide a cryptographic proof of the security characteristics. But it is the best thing we can do if the authenticator is not able to have an attestation private key. BasicSurrogate // Ecdaa - Indicates use of elliptic curve based direct anonymous attestation as defined in [FIDOEcdaaAlgorithm]. Support for this attestation type is optional at this time. It might be required by FIDO Certification. Ecdaa // AttCA - Indicates PrivacyCA attestation as defined in [TCG-CMCProfile-AIKCertEnroll]. Support for this attestation type is optional at this time. It might be required by FIDO Certification. AttCA ) // AuthenticatorStatus - This enumeration describes the status of an authenticator model as identified by its AAID and potentially some additional information (such as a specific attestation key). type AuthenticatorStatus string const ( // NotFidoCertified - This authenticator is not FIDO certified. NotFidoCertified = "NOT_FIDO_CERTIFIED" // FidoCertified - This authenticator has passed FIDO functional certification. This certification scheme is phased out and will be replaced by FIDO_CERTIFIED_L1. FidoCertified = "FIDO_CERTIFIED" // UserVerificationBypass - Indicates that malware is able to bypass the user verification. This means that the authenticator could be used without the user's consent and potentially even without the user's knowledge. UserVerificationBypass = "USER_VERIFICATION_BYPASS" // AttestationKeyCompromise - Indicates that an attestation key for this authenticator is known to be compromised. Additional data should be supplied, including the key identifier and the date of compromise, if known. AttestationKeyCompromise = "ATTESTATION_KEY_COMPROMISE" // UserKeyRemoteCompromise - This authenticator has identified weaknesses that allow registered keys to be compromised and should not be trusted. This would include both, e.g. weak entropy that causes predictable keys to be generated or side channels that allow keys or signatures to be forged, guessed or extracted. UserKeyRemoteCompromise = "USER_KEY_REMOTE_COMPROMISE" // UserKeyPhysicalCompromise - This authenticator has known weaknesses in its key protection mechanism(s) that allow user keys to be extracted by an adversary in physical possession of the device. UserKeyPhysicalCompromise = "USER_KEY_PHYSICAL_COMPROMISE" // UpdateAvailable - A software or firmware update is available for the device. Additional data should be supplied including a URL where users can obtain an update and the date the update was published. UpdateAvailable = "UPDATE_AVAILABLE" // Revoked - The FIDO Alliance has determined that this authenticator should not be trusted for any reason, for example if it is known to be a fraudulent product or contain a deliberate backdoor. Revoked = "REVOKED" // SelfAssertionSubmitted - The authenticator vendor has completed and submitted the self-certification checklist to the FIDO Alliance. If this completed checklist is publicly available, the URL will be specified in StatusReport.url. SelfAssertionSubmitted = "SELF_ASSERTION_SUBMITTED" // FidoCertifiedL1 - The authenticator has passed FIDO Authenticator certification at level 1. This level is the more strict successor of FIDO_CERTIFIED. FidoCertifiedL1 = "FIDO_CERTIFIED_L1" // FidoCertifiedL1plus - The authenticator has passed FIDO Authenticator certification at level 1+. This level is the more than level 1. FidoCertifiedL1plus = "FIDO_CERTIFIED_L1plus" // FidoCertifiedL2 - The authenticator has passed FIDO Authenticator certification at level 2. This level is more strict than level 1+. FidoCertifiedL2 = "FIDO_CERTIFIED_L2" // FidoCertifiedL2plus - The authenticator has passed FIDO Authenticator certification at level 2+. This level is more strict than level 2. FidoCertifiedL2plus = "FIDO_CERTIFIED_L2plus" // FidoCertifiedL3 - The authenticator has passed FIDO Authenticator certification at level 3. This level is more strict than level 2+. FidoCertifiedL3 = "FIDO_CERTIFIED_L3" // FidoCertifiedL3plus - The authenticator has passed FIDO Authenticator certification at level 3+. This level is more strict than level 3. FidoCertifiedL3plus = "FIDO_CERTIFIED_L3plus" ) // UndesiredAuthenticatorStatus is an array of undesirable authenticator statuses var UndesiredAuthenticatorStatus = [...]AuthenticatorStatus{ AttestationKeyCompromise, UserVerificationBypass, UserKeyRemoteCompromise, UserKeyPhysicalCompromise, Revoked, } // IsUndesiredAuthenticatorStatus returns whether the supplied authenticator status is desirable or not func IsUndesiredAuthenticatorStatus(status AuthenticatorStatus) bool { for _, s := range UndesiredAuthenticatorStatus { if s == status { return true } } return false } // StatusReport - Contains the current BiometricStatusReport of one of the authenticator's biometric component. type StatusReport struct { // Status of the authenticator. Additional fields MAY be set depending on this value. Status string `json:"status"` // ISO-8601 formatted date since when the status code was set, if applicable. If no date is given, the status is assumed to be effective while present. EffectiveDate string `json:"effectiveDate"` // Base64-encoded [RFC4648] (not base64url!) DER [ITU-X690-2008] PKIX certificate value related to the current status, if applicable. Certificate string `json:"certificate"` // HTTPS URL where additional information may be found related to the current status, if applicable. URL string `json:"url"` // Describes the externally visible aspects of the Authenticator Certification evaluation. CertificationDescriptor string `json:"certificationDescriptor"` // The unique identifier for the issued Certification. CertificateNumber string `json:"certificateNumber"` // The version of the Authenticator Certification Policy the implementation is Certified to, e.g. "1.0.0". CertificationPolicyVersion string `json:"certificationPolicyVersion"` // The Document Version of the Authenticator Security Requirements (DV) [FIDOAuthenticatorSecurityRequirements] the implementation is certified to, e.g. "1.2.0". CertificationRequirementsVersion string `json:"certificationRequirementsVersion"` } // BiometricStatusReport - Contains the current BiometricStatusReport of one of the authenticator's biometric component. type BiometricStatusReport struct { // Achieved level of the biometric certification of this biometric component of the authenticator CertLevel uint16 `json:"certLevel"` // A single USER_VERIFY constant indicating the modality of the biometric component Modality uint32 `json:"modality"` // ISO-8601 formatted date since when the certLevel achieved, if applicable. If no date is given, the status is assumed to be effective while present. EffectiveDate string `json:"effectiveDate"` // Describes the externally visible aspects of the Biometric Certification evaluation. CertificationDescriptor string `json:"certificationDescriptor"` // The unique identifier for the issued Biometric Certification. CertificateNumber string `json:"certificateNumber"` // The version of the Biometric Certification Policy the implementation is Certified to, e.g. "1.0.0". CertificationPolicyVersion string `json:"certificationPolicyVersion"` // The version of the Biometric Requirements [FIDOBiometricsRequirements] the implementation is certified to, e.g. "1.0.0". CertificationRequirementsVersion string `json:"certificationRequirementsVersion"` } // MetadataTOCPayloadEntry - Represents the MetadataTOCPayloadEntry type MetadataTOCPayloadEntry struct { // The AAID of the authenticator this metadata TOC payload entry relates to. Aaid string `json:"aaid"` // The Authenticator Attestation GUID. AaGUID string `json:"aaguid"` // A list of the attestation certificate public key identifiers encoded as hex string. AttestationCertificateKeyIdentifiers []string `json:"attestationCertificateKeyIdentifiers"` // The hash value computed over the base64url encoding of the UTF-8 representation of the JSON encoded metadata statement available at url and as defined in [FIDOMetadataStatement]. Hash string `json:"hash"` // Uniform resource locator (URL) of the encoded metadata statement for this authenticator model (identified by its AAID, AAGUID or attestationCertificateKeyIdentifier). URL string `json:"url"` // Status of the FIDO Biometric Certification of one or more biometric components of the Authenticator BiometricStatusReports []BiometricStatusReport `json:"biometricStatusReports"` // An array of status reports applicable to this authenticator. StatusReports []StatusReport `json:"statusReports"` // ISO-8601 formatted date since when the status report array was set to the current value. TimeOfLastStatusChange string `json:"timeOfLastStatusChange"` // URL of a list of rogue (i.e. untrusted) individual authenticators. RogueListURL string `json:"rogueListURL"` // The hash value computed over the Base64url encoding of the UTF-8 representation of the JSON encoded rogueList available at rogueListURL (with type rogueListEntry[]). RogueListHash string `json:"rogueListHash"` MetadataStatement MetadataStatement } // RogueListEntry - Contains a list of individual authenticators known to be rogue type RogueListEntry struct { // Base64url encoding of the rogue authenticator's secret key Sk string `json:"sk"` // ISO-8601 formatted date since when this entry is effective. Date string `json:"date"` } // MetadataTOCPayload - Represents the MetadataTOCPayload type MetadataTOCPayload struct { // The legalHeader, if present, contains a legal guide for accessing and using metadata, which itself MAY contain URL(s) pointing to further information, such as a full Terms and Conditions statement. LegalHeader string `json:"legalHeader"` // The serial number of this UAF Metadata TOC Payload. Serial numbers MUST be consecutive and strictly monotonic, i.e. the successor TOC will have a no value exactly incremented by one. Number int `json:"no"` // ISO-8601 formatted date when the next update will be provided at latest. NextUpdate string `json:"nextUpdate"` // List of zero or more MetadataTOCPayloadEntry objects. Entries []MetadataTOCPayloadEntry `json:"entries"` } // Version - Represents a generic version with major and minor fields. type Version struct { // Major version. Major uint16 `json:"major"` // Minor version. Minor uint16 `json:"minor"` } // CodeAccuracyDescriptor describes the relevant accuracy/complexity aspects of passcode user verification methods. type CodeAccuracyDescriptor struct { // The numeric system base (radix) of the code, e.g. 10 in the case of decimal digits. Base uint16 `json:"base"` // The minimum number of digits of the given base required for that code, e.g. 4 in the case of 4 digits. MinLength uint16 `json:"minLength"` // Maximum number of false attempts before the authenticator will block this method (at least for some time). 0 means it will never block. MaxRetries uint16 `json:"maxRetries"` // Enforced minimum number of seconds wait time after blocking (e.g. due to forced reboot or similar). // 0 means this user verification method will be blocked, either permanently or until an alternative user verification method method succeeded. // All alternative user verification methods MUST be specified appropriately in the Metadata in userVerificationDetails. BlockSlowdown uint16 `json:"blockSlowdown"` } // The BiometricAccuracyDescriptor describes relevant accuracy/complexity aspects in the case of a biometric user verification method. type BiometricAccuracyDescriptor struct { // The false rejection rate [ISO19795-1] for a single template, i.e. the percentage of verification transactions with truthful claims of identity that are incorrectly denied. SelfAttestedFRR int64 `json:"selfAttestedFRR "` // The false acceptance rate [ISO19795-1] for a single template, i.e. the percentage of verification transactions with wrongful claims of identity that are incorrectly confirmed. SelfAttestedFAR int64 `json:"selfAttestedFAR "` // Maximum number of alternative templates from different fingers allowed. MaxTemplates uint16 `json:"maxTemplates"` // Maximum number of false attempts before the authenticator will block this method (at least for some time). 0 means it will never block. MaxRetries uint16 `json:"maxRetries"` // Enforced minimum number of seconds wait time after blocking (e.g. due to forced reboot or similar). // 0 means that this user verification method will be blocked either permanently or until an alternative user verification method succeeded. // All alternative user verification methods MUST be specified appropriately in the metadata in userVerificationDetails. BlockSlowdown uint16 `json:"blockSlowdown"` } // The PatternAccuracyDescriptor describes relevant accuracy/complexity aspects in the case that a pattern is used as the user verification method. type PatternAccuracyDescriptor struct { // Number of possible patterns (having the minimum length) out of which exactly one would be the right one, i.e. 1/probability in the case of equal distribution. MinComplexity uint32 `json:"minComplexity"` // Maximum number of false attempts before the authenticator will block authentication using this method (at least temporarily). 0 means it will never block. MaxRetries uint16 `json:"maxRetries"` // Enforced minimum number of seconds wait time after blocking (due to forced reboot or similar mechanism). // 0 means this user verification method will be blocked, either permanently or until an alternative user verification method method succeeded. // All alternative user verification methods MUST be specified appropriately in the metadata under userVerificationDetails. BlockSlowdown uint16 `json:"blockSlowdown"` } // VerificationMethodDescriptor - A descriptor for a specific base user verification method as implemented by the authenticator. type VerificationMethodDescriptor struct { // a single USER_VERIFY constant (see [FIDORegistry]), not a bit flag combination. This value MUST be non-zero. UserVerification uint32 `json:"userVerification"` // May optionally be used in the case of method USER_VERIFY_PASSCODE. CaDesc CodeAccuracyDescriptor `json:"caDesc"` // May optionally be used in the case of method USER_VERIFY_FINGERPRINT, USER_VERIFY_VOICEPRINT, USER_VERIFY_FACEPRINT, USER_VERIFY_EYEPRINT, or USER_VERIFY_HANDPRINT. BaDesc BiometricAccuracyDescriptor `json:"baDesc"` // May optionally be used in case of method USER_VERIFY_PATTERN. PaDesc PatternAccuracyDescriptor `json:"paDesc"` } // VerificationMethodANDCombinations MUST be non-empty. It is a list containing the base user verification methods which must be passed as part of a successful user verification. type VerificationMethodANDCombinations struct { //This list will contain only a single entry if using a single user verification method is sufficient. // If this list contains multiple entries, then all of the listed user verification methods MUST be passed as part of the user verification process. VerificationMethodAndCombinations []VerificationMethodDescriptor `json:"verificationMethodANDCombinations"` } // The rgbPaletteEntry is an RGB three-sample tuple palette entry type rgbPaletteEntry struct { // Red channel sample value R uint16 `json:"r"` // Green channel sample value G uint16 `json:"g"` // Blue channel sample value B uint16 `json:"b"` } // The DisplayPNGCharacteristicsDescriptor describes a PNG image characteristics as defined in the PNG [PNG] spec for IHDR (image header) and PLTE (palette table) type DisplayPNGCharacteristicsDescriptor struct { // image width Width uint32 `json:"width"` // image height Height uint32 `json:"height"` // Bit depth - bits per sample or per palette index. BitDepth byte `json:"bitDepth"` // Color type defines the PNG image type. ColorType byte `json:"colorType"` // Compression method used to compress the image data. Compression byte `json:"compression"` // Filter method is the preprocessing method applied to the image data before compression. Filter byte `json:"filter"` // Interlace method is the transmission order of the image data. Interlace byte `json:"interlace"` // 1 to 256 palette entries Plte []rgbPaletteEntry `json:"plte"` } // EcdaaTrustAnchor - In the case of ECDAA attestation, the ECDAA-Issuer's trust anchor MUST be specified in this field. type EcdaaTrustAnchor struct { // base64url encoding of the result of ECPoint2ToB of the ECPoint2 X X string `json:"x"` // base64url encoding of the result of ECPoint2ToB of the ECPoint2 Y Y string `json:"y"` // base64url encoding of the result of BigNumberToB(c) C string `json:"c"` // base64url encoding of the result of BigNumberToB(sx) SX string `json:"sx"` // base64url encoding of the result of BigNumberToB(sy) SY string `json:"sy"` // Name of the Barreto-Naehrig elliptic curve for G1. "BN_P256", "BN_P638", "BN_ISOP256", and "BN_ISOP512" are supported. G1Curve string `json:"G1Curve"` } // ExtensionDescriptor - This descriptor contains an extension supported by the authenticator. type ExtensionDescriptor struct { // Identifies the extension. ID string `json:"id"` // The TAG of the extension if this was assigned. TAGs are assigned to extensions if they could appear in an assertion. Tag uint16 `json:"tag"` // Contains arbitrary data further describing the extension and/or data needed to correctly process the extension. Data string `json:"data"` // Indicates whether unknown extensions must be ignored (false) or must lead to an error (true) when the extension is to be processed by the FIDO Server, FIDO Client, ASM, or FIDO Authenticator. FailIfUnknown bool `json:"fail_if_unknown"` } // MetadataStatement - Authenticator metadata statements are used directly by the FIDO server at a relying party, but the information contained in the authoritative statement is used in several other places. type MetadataStatement struct { // The legalHeader, if present, contains a legal guide for accessing and using metadata, which itself MAY contain URL(s) pointing to further information, such as a full Terms and Conditions statement. LegalHeader string `json:"legalHeader"` // The Authenticator Attestation ID. Aaid string `json:"aaid"` // The Authenticator Attestation GUID. AaGUID string `json:"aaguid"` // A list of the attestation certificate public key identifiers encoded as hex string. AttestationCertificateKeyIdentifiers []string `json:"attestationCertificateKeyIdentifiers"` // A human-readable, short description of the authenticator, in English. Description string `json:"description"` // A list of human-readable short descriptions of the authenticator in different languages. AlternativeDescriptions map[string]string `json:"alternativeDescriptions"` // Earliest (i.e. lowest) trustworthy authenticatorVersion meeting the requirements specified in this metadata statement. AuthenticatorVersion uint16 `json:"authenticatorVersion"` // The FIDO protocol family. The values "uaf", "u2f", and "fido2" are supported. ProtocolFamily string `json:"protocolFamily"` // The FIDO unified protocol version(s) (related to the specific protocol family) supported by this authenticator. Upv []Version `json:"upv"` // The assertion scheme supported by the authenticator. AssertionScheme string `json:"assertionScheme"` // The preferred authentication algorithm supported by the authenticator. AuthenticationAlgorithm uint16 `json:"authenticationAlgorithm"` // The list of authentication algorithms supported by the authenticator. AuthenticationAlgorithms []uint16 `json:"authenticationAlgorithms"` // The preferred public key format used by the authenticator during registration operations. PublicKeyAlgAndEncoding uint16 `json:"publicKeyAlgAndEncoding"` // The list of public key formats supported by the authenticator during registration operations. PublicKeyAlgAndEncodings []uint16 `json:"publicKeyAlgAndEncodings"` // The supported attestation type(s). AttestationTypes []uint16 `json:"attestationTypes"` // A list of alternative VerificationMethodANDCombinations. UserVerificationDetails [][]VerificationMethodDescriptor `json:"userVerificationDetails"` // A 16-bit number representing the bit fields defined by the KEY_PROTECTION constants in the FIDO Registry of Predefined Values KeyProtection uint16 `json:"keyProtection"` // This entry is set to true or it is ommitted, if the Uauth private key is restricted by the authenticator to only sign valid FIDO signature assertions. // This entry is set to false, if the authenticator doesn't restrict the Uauth key to only sign valid FIDO signature assertions. IsKeyRestricted bool `json:"isKeyRestricted"` // This entry is set to true or it is ommitted, if Uauth key usage always requires a fresh user verification // This entry is set to false, if the Uauth key can be used without requiring a fresh user verification, e.g. without any additional user interaction, if the user was verified a (potentially configurable) caching time ago. IsFreshUserVerificationRequired bool `json:"isFreshUserVerificationRequired"` // A 16-bit number representing the bit fields defined by the MATCHER_PROTECTION constants in the FIDO Registry of Predefined Values MatcherProtection uint16 `json:"matcherProtection"` // The authenticator's overall claimed cryptographic strength in bits (sometimes also called security strength or security level). CryptoStrength uint16 `json:"cryptoStrength"` // Description of the particular operating environment that is used for the Authenticator. OperatingEnv string `json:"operatingEnv"` // A 32-bit number representing the bit fields defined by the ATTACHMENT_HINT constants in the FIDO Registry of Predefined Values AttachmentHint uint32 `json:"attachmentHint"` // Indicates if the authenticator is designed to be used only as a second factor, i.e. requiring some other authentication method as a first factor (e.g. username+password). IsSecondFactorOnly bool `json:"isSecondFactorOnly"` // A 16-bit number representing a combination of the bit flags defined by the TRANSACTION_CONFIRMATION_DISPLAY constants in the FIDO Registry of Predefined Values TcDisplay uint16 `json:"tcDisplay"` // Supported MIME content type [RFC2049] for the transaction confirmation display, such as text/plain or image/png. TcDisplayContentType string `json:"tcDisplayContentType"` // A list of alternative DisplayPNGCharacteristicsDescriptor. Each of these entries is one alternative of supported image characteristics for displaying a PNG image. TcDisplayPNGCharacteristics []DisplayPNGCharacteristicsDescriptor `json:"tcDisplayPNGCharacteristics"` // Each element of this array represents a PKIX [RFC5280] X.509 certificate that is a valid trust anchor for this authenticator model. // Multiple certificates might be used for different batches of the same model. // The array does not represent a certificate chain, but only the trust anchor of that chain. // A trust anchor can be a root certificate, an intermediate CA certificate or even the attestation certificate itself. AttestationRootCertificates []string `json:"attestationRootCertificates"` // A list of trust anchors used for ECDAA attestation. This entry MUST be present if and only if attestationType includes ATTESTATION_ECDAA. EcdaaTrustAnchors []EcdaaTrustAnchor `json:"ecdaaTrustAnchors"` // A data: url [RFC2397] encoded PNG [PNG] icon for the Authenticator. Icon string `json:"icon"` // List of extensions supported by the authenticator. SupportedExtensions []ExtensionDescriptor `json:"supportedExtensions"` } // MDSGetEndpointsRequest is the request sent to the conformance metadata getEndpoints endpoint type MDSGetEndpointsRequest struct { // The URL of the local server endpoint, e.g. https://webauthn.io/ Endpoint string `json:"endpoint"` } // MDSGetEndpointsResponse is the response received from a conformance metadata getEndpoints request type MDSGetEndpointsResponse struct { // The status of the response Status string `json:"status"` // An array of urls, each pointing to a MetadataTOCPayload Result []string `json:"result"` } // ProcessMDSTOC processes a FIDO metadata table of contents object per §3.1.8, steps 1 through 5 // FIDO Authenticator Metadata Service // https://fidoalliance.org/specs/fido-v2.0-rd-20180702/fido-metadata-service-v2.0-rd-20180702.html#metadata-toc-object-processing-rules func ProcessMDSTOC(url string, suffix string, c http.Client) (MetadataTOCPayload, string, error) { var tocAlg string var payload MetadataTOCPayload // 1. The FIDO Server MUST be able to download the latest metadata TOC object from the well-known URL, when appropriate. body, err := downloadBytes(url+suffix, c) if err != nil { return payload, tocAlg, err } // Steps 2 - 4 done in unmarshalMDSTOC. Caller is responsible for step 5. return unmarshalMDSTOC(body, c) } func unmarshalMDSTOC(body []byte, c http.Client) (MetadataTOCPayload, string, error) { var tocAlg string var payload MetadataTOCPayload token, err := jwt.Parse(string(body), func(token *jwt.Token) (interface{}, error) { // 2. If the x5u attribute is present in the JWT Header, then if _, ok := token.Header["x5u"].([]interface{}); ok { // never seen an x5u here, although it is in the spec return nil, errors.New("x5u encountered in header of metadata TOC payload") } var chain []interface{} // 3. If the x5u attribute is missing, the chain should be retrieved from the x5c attribute. if x5c, ok := token.Header["x5c"].([]interface{}); !ok { // If that attribute is missing as well, Metadata TOC signing trust anchor is considered the TOC signing certificate chain. root, err := getMetdataTOCSigningTrustAnchor(c) if nil != err { return nil, err } chain[0] = root } else { chain = x5c } // The certificate chain MUST be verified to properly chain to the metadata TOC signing trust anchor valid, err := validateChain(chain, c) if !valid || err != nil { return nil, err } // chain validated, extract the TOC signing certificate from the chain // create a buffer large enough to hold the certificate bytes o := make([]byte, base64.StdEncoding.DecodedLen(len(chain[0].(string)))) // base64 decode the certificate into the buffer n, err := base64.StdEncoding.Decode(o, []byte(chain[0].(string))) // parse the certificate from the buffer cert, err := x509.ParseCertificate(o[:n]) if err != nil { return nil, err } // 4. Verify the signature of the Metadata TOC object using the TOC signing certificate chain // jwt.Parse() uses the TOC signing certificate public key internally to verify the signature return cert.PublicKey, err }) if err != nil { return payload, tocAlg, err } tocAlg = token.Header["alg"].(string) err = mapstructure.Decode(token.Claims, &payload) return payload, tocAlg, err } func getMetdataTOCSigningTrustAnchor(c http.Client) ([]byte, error) { rooturl := "" if Conformance { rooturl = "https://fidoalliance.co.nz/mds/pki/MDSROOT.crt" } else { rooturl = "https://mds.fidoalliance.org/Root.cer" } return downloadBytes(rooturl, c) } func validateChain(chain []interface{}, c http.Client) (bool, error) { root, err := getMetdataTOCSigningTrustAnchor(c) if err != nil { return false, err } roots := x509.NewCertPool() ok := roots.AppendCertsFromPEM(root) if !ok { return false, err } o := make([]byte, base64.StdEncoding.DecodedLen(len(chain[1].(string)))) n, err := base64.StdEncoding.Decode(o, []byte(chain[1].(string))) if err != nil { return false, err } intcert, err := x509.ParseCertificate(o[:n]) if err != nil { return false, err } if revoked, ok := revoke.VerifyCertificate(intcert); !ok { return false, errCRLUnavailable } else if revoked { return false, errIntermediateCertRevoked } ints := x509.NewCertPool() ints.AddCert(intcert) l := make([]byte, base64.StdEncoding.DecodedLen(len(chain[0].(string)))) n, err = base64.StdEncoding.Decode(l, []byte(chain[0].(string))) if err != nil { return false, err } leafcert, err := x509.ParseCertificate(l[:n]) if err != nil { return false, err } if revoked, ok := revoke.VerifyCertificate(leafcert); !ok { return false, errCRLUnavailable } else if revoked { return false, errLeafCertRevoked } opts := x509.VerifyOptions{ Roots: roots, Intermediates: ints, } _, err = leafcert.Verify(opts) return err == nil, err } // GetMetadataStatement iterates through a list of payload entries within a FIDO metadata table of contents object per §3.1.8, step 6 // FIDO Authenticator Metadata Service // https://fidoalliance.org/specs/fido-v2.0-rd-20180702/fido-metadata-service-v2.0-rd-20180702.html#metadata-toc-object-processing-rules func GetMetadataStatement(entry MetadataTOCPayloadEntry, suffix string, alg string, c http.Client) (MetadataStatement, error) { var statement MetadataStatement // 1. Ignore the entry if the AAID, AAGUID or attestationCertificateKeyIdentifiers is not relevant to the relying party (e.g. not acceptable by any policy) // Caller is responsible for determining if entry is relevant. // 2. Download the metadata statement from the URL specified by the field url. body, err := downloadBytes(entry.URL+suffix, c) if err != nil { return statement, err } // 3. Check whether the status report of the authenticator model has changed compared to the cached entry by looking at the fields timeOfLastStatusChange and statusReport. // Caller is responsible for cache // step 4 done in unmarshalMetadataStatement, caller is responsible for step 5 return unmarshalMetadataStatement(body, entry.Hash) } func unmarshalMetadataStatement(body []byte, hash string) (MetadataStatement, error) { // 4. Compute the hash value of the metadata statement downloaded from the URL and verify the hash value to the hash specified in the field hash of the metadata TOC object. var statement MetadataStatement entryHash, err := base64.URLEncoding.DecodeString(hash) if err != nil { entryHash, err = base64.RawURLEncoding.DecodeString(hash) } if err != nil { return statement, err } // TODO: Get hasher based on MDS TOC alg instead of assuming SHA256 hasher := crypto.SHA256.New() _, _ = hasher.Write(body) hashed := hasher.Sum(nil) // Ignore the downloaded metadata statement if the hash value doesn't match. if !bytes.Equal(hashed, entryHash) { return statement, errHashValueMismatch } // Extract the metadata statement from base64 encoded form n := base64.URLEncoding.DecodedLen(len(body)) out := make([]byte, n) m, err := base64.URLEncoding.Decode(out, body) if err != nil { return statement, err } // Unmarshal the metadata statement into a MetadataStatement structure and return it to caller err = json.Unmarshal(out[:m], &statement) return statement, err } func downloadBytes(url string, c http.Client) ([]byte, error) { res, err := c.Get(url) if err != nil { return nil, err } defer res.Body.Close() body, _ := ioutil.ReadAll(res.Body) return body, err } type MetadataError struct { // Short name for the type of error that has occurred Type string `json:"type"` // Additional details about the error Details string `json:"error"` // Information to help debug the error DevInfo string `json:"debug"` } var ( errHashValueMismatch = &MetadataError{ Type: "hash_mismatch", Details: "Hash value mismatch between entry.Hash and downloaded bytes", } errIntermediateCertRevoked = &MetadataError{ Type: "intermediate_revoked", Details: "Intermediate certificate is on issuers revocation list", } errLeafCertRevoked = &MetadataError{ Type: "leaf_revoked", Details: "Leaf certificate is on issuers revocation list", } errCRLUnavailable = &MetadataError{ Type: "crl_unavailable", Details: "Certificate revocation list is unavailable", } ) func (err *MetadataError) Error() string { return err.Details }