-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TPM registration responses in v1.6.33 appear to have invalid cert path #618
Comments
@herrjemand As far as I check with v1.6.46, this issue still exists. |
v1.6.48 didn't help. Same issue. |
The CRL at this URL: https://pki.certinfra.fidoalliance.org/tpm/crl/FIDO%20Fake%20TPM%20Root%20Certificate%20Authority%202018.crl
Is signed with this from the conformance metadata file
The authority key identifier on the CRL matches the subject key identifier on the certificate, but the X509v3 Key Usage extension only has Additionally, the CRL in question and the one at |
@herrjemand any update regarding this test failure? Seems not fixed with |
What about the |
This is still an issue in v1.7.2, same issue as I outlined prior above. |
Did you update metadata?
On Thu, 21 Jul 2022 at 9:03 PM, Alex Seigler ***@***.***> wrote:
This is still an issue in v1.7.2, same issue as I outlined prior above.
—
Reply to this email directly, view it on GitHub
<#618 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAMPOFGYJPUEXHUOS37JKILVVGGITANCNFSM5CSUBQVA>
.
You are receiving this because you were mentioned.Message ID:
<fido-alliance/conformance-test-tools-resources/issues/618/1191783155@
github.com>
--
Yuriy Ackermann
FIDO, Identity, Standards
skype: ackermann.yuriy
github: @herrjemand <https://github.com/herrjemand>
twitter: @herrjemand <https://twitter.com/herrjemand>
medium: @herrjemand ***@***.***>
|
|
Any update on resolution for this issue? |
@herrjemand is there any update on this issue? This issue blocks our interop testing plans. |
Ok... how about now? https://builds.fidoalliance.org/Desktop%20UAF%20FIDO2%20U2F/v1.7.7/ |
@herrjemand let me check them again. Anyway, thanks for your effort. I'll give you the feedbacks. |
@herrjemand we are still seeing the same issue with the certificates in 1.7.7 |
@herrjemand |
This issue seems to be resolved in |
Based on the recent feedback this issue resolved since 1.7.10 |
FIRST PRE CHECK
What protocol are you implementing?
NOTE: UAF 1.0 certification have been officially sunset. U2F 1.2 only supported version of U2F.
What is your implementation class?
If you are platform authenticator vendor, please email [email protected]
What is the version of the tool are you using?
v1.6.33
What is the OS and the version are you running?
For desktop tools
For UAF mobile tools
Issue description
I'm running MakeCredential: Platform tests and the TPM tests in particular seem to have trouble with validating the certificate path, starting with the first two certs in x5c:
The cert path is invalid based just on the first two certificates - the root cert is never evaluated in the above failures.
Here's a cert chain I pulled from one of the failures:
The text was updated successfully, but these errors were encountered: