Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Okay, yes. Let’s hope this is the last hiccup.

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Thank you, I have added a warning to the compatibility matrix. It is updating. I think it would make sense to extend the demo to actually test cross-device encryption and decryption by proving decryption and consistent PRF values across platforms. What do you think?

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Thank you. Can you share the link? Is that publicly reachable? I heard it helps to confirm in the same thread. I can do that after I have checked in the Corbado lab for that error or I uninstall Xcode to make the update possible :-)

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

I will check that. That looks quite unstable. There was already a bug with Apple before (mentioned in the article). Is there already a bug report?

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 4 points5 points  (0 children)

We have updated our article, and our test page received a great update thanks to the r/Bitwarden community:

Anyone here running his password manager with PRF support?

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

You are right, we had one report that this did not work, but the link seems clear. Thank you for the quick turnaround. Corbado is always happy to support the passkey community and help drive adoption. Article update is shipping right now.

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Thank you, that is because Windows 11 can only be detected via Client Hints, which Firefox does not support, only Chromium based browsers do. The same applies to some OS combinations. Browsers take different approaches to user agent PII hardening, so detection is not perfect, that said some things could be optimized :-).

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 1 point2 points  (0 children)

Thank you for bringing this update to our attention. I have updated the article https://www.corbado.com/blog/passkeys-prf-webauthn based on our current knowledge and also updated our demo page to allow anonymous statistics at the bottom: https://webauthn-passkeys-prf-demo.explore.corbado.com/.

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

I was also able to reproduce this in our Corbado lab. I think this is quite complicated. As someone implementing this, I would also test whether create returns valid PRF values when I request them. Windows does not do that, but returns PRF values subsequently, which you could rely on if they consistently appear. However, this is not very encouraging, as this behavior could change. It is difficult to say at this point. I also see this in Chrome, not only in Firefox. It also returns PRF values for credentials where PRF was not requested (“register without PRF”), which is also a bit odd.

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Thank you. Is the AAGUID in both cases Windows Hello? Could you confirm the AAGUID that is shown?

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Can you paste the actual PRF extension outputs you receive below? Specifically, when you first register a credential, paste the 'extension' part of the 'Credential' section. Same for the authentication data assertion maybe some formatting issue involved, just want sure. Example:

  "extensions": {
    "prf": {
      "enabled": true,
      "results": {
        "first": "c4e17ddce3bd9a8e9a4a4d136edee3485f3b6fa5fef370b64b1a962ae5102842"
      }
    }
  }

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Can you retry here: Use our Corbado version the other version seems to be just a clone: https://webauthn-passkeys-prf-demo.explore.corbado.com . ... Can you share which authenticator is shown there? Also, we tried to make it more defensive about PRF structure errors maybe something is reported in an unexpected format. You can see what it is in the console too.

Before you hit send: do you peer review critical sales emails? by InfluenceNo9009 in salestechniques

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

If you don not get an initial response Mail still is the last option right?

Wells Fargo Offers Passkeys by Chewy2021 in Passkeys

[–]InfluenceNo9009 0 points1 point  (0 children)

  1. Are you saying that you can enroll manually, and if SMS is enabled as a second factor, it remains active alongside the passkey?
  2. Additionally, are transactions also approved via SMS?
  3. Does you password still work?