-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OID for Attestation extension incorrect #90
Comments
Hi. That is also why I have done code together with Uwe to allow TameMyCerts to have included YubiKey attestion :) This is where it becomes a bit murky.. First you wrote the same OID twice. I know that the documentation says .1. But the Yubico reference implementation yubico-piv-tool, says: The question do we want the PowerShell module to behave as the reference implementation or do we want to follow the standard :/ |
Making sure Confirm-YubikeyAttestion, allows for both YubiKey documentation .1 and yubico-piv-tool implementation .11 location of Attestation Data. Added data out put to say where Attestation Data was located. Update Build-YubikeyPIVCertificateSigningRequest to give better error if KeyStatus is wrong. In regard to #90, while I try to figure out where to store the Attestation Data should be in a new CSR.
I did a fix that allows for both in the verification Cmdlet. I will try get more information about yubico-piv-tool implementation. |
Huh, that’s odd - it seems they’re using their own OIDs differently to what’s in the spec! Makes sense to follow what’s happening in yubikey-piv-tool, but agree that it’s probably worth seeing what they think upstream - looks like a typo in their code may have just snuck through… Thanks for the quick reply! :^) |
@virot I've raised this upstream in Yubico/yubico-piv-tool#526 🙂 Thanks for the adding the flags in the cmdlets! |
Hi there @virot!
First off, absolutely love this library/module! Makes things so much nicer.
I'd been looking for a way to do TPM-style attestation with Yubikey-signed CSRs for ages, and the combination of this library with TameMyCerts is perfect!
One thing I noticed is that the OID used to staple the attestation to the CSR,
1.3.6.1.4.1.41482.3.11
is incorrect; it should likely be1.3.6.1.4.1.41482.3.11
, as referenced in the Yubikey OID referenceThe
.1
OID is for "Attestation data and signature", and the.2
OID is for "Attestation certificate"; the.11
is for identifying that the card is "CSPN" certified, which doesn't seem to match up.Likely just a typo, and happy to make a PR to tweak it if needed, just thought I'd check first!
Thanks again for the great module - it's a great tool to have around!
The text was updated successfully, but these errors were encountered: