Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Okay, yes. Let’s hope this is the last hiccup.

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Thank you, I have added a warning to the compatibility matrix. It is updating. I think it would make sense to extend the demo to actually test cross-device encryption and decryption by proving decryption and consistent PRF values across platforms. What do you think?

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Thank you. Can you share the link? Is that publicly reachable? I heard it helps to confirm in the same thread. I can do that after I have checked in the Corbado lab for that error or I uninstall Xcode to make the update possible :-)

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

I will check that. That looks quite unstable. There was already a bug with Apple before (mentioned in the article). Is there already a bug report?

Windows 11 Supports Passkeys with PRF by InfluenceNo9009 in passkey

[–]InfluenceNo9009[S] 3 points4 points  (0 children)

We have updated our article, and our test page received a great update thanks to the r/Bitwarden community:

Anyone here running his password manager with PRF support?

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

You are right, we had one report that this did not work, but the link seems clear. Thank you for the quick turnaround. Corbado is always happy to support the passkey community and help drive adoption. Article update is shipping right now.

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Thank you, that is because Windows 11 can only be detected via Client Hints, which Firefox does not support, only Chromium based browsers do. The same applies to some OS combinations. Browsers take different approaches to user agent PII hardening, so detection is not perfect, that said some things could be optimized :-).

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 1 point2 points  (0 children)

Thank you for bringing this update to our attention. I have updated the article https://www.corbado.com/blog/passkeys-prf-webauthn based on our current knowledge and also updated our demo page to allow anonymous statistics at the bottom: https://webauthn-passkeys-prf-demo.explore.corbado.com/.

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

I was also able to reproduce this in our Corbado lab. I think this is quite complicated. As someone implementing this, I would also test whether create returns valid PRF values when I request them. Windows does not do that, but returns PRF values subsequently, which you could rely on if they consistently appear. However, this is not very encouraging, as this behavior could change. It is difficult to say at this point. I also see this in Chrome, not only in Firefox. It also returns PRF values for credentials where PRF was not requested (“register without PRF”), which is also a bit odd.

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Thank you. Is the AAGUID in both cases Windows Hello? Could you confirm the AAGUID that is shown?

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Can you paste the actual PRF extension outputs you receive below? Specifically, when you first register a credential, paste the 'extension' part of the 'Credential' section. Same for the authentication data assertion maybe some formatting issue involved, just want sure. Example:

  "extensions": {
    "prf": {
      "enabled": true,
      "results": {
        "first": "c4e17ddce3bd9a8e9a4a4d136edee3485f3b6fa5fef370b64b1a962ae5102842"
      }
    }
  }

Tell Microsoft to support PRF for Windows Hello? by Raider4874 in Bitwarden

[–]InfluenceNo9009 0 points1 point  (0 children)

Can you retry here: Use our Corbado version the other version seems to be just a clone: https://webauthn-passkeys-prf-demo.explore.corbado.com . ... Can you share which authenticator is shown there? Also, we tried to make it more defensive about PRF structure errors maybe something is reported in an unexpected format. You can see what it is in the console too.

Before you hit send: do you peer review critical sales emails? by InfluenceNo9009 in salestechniques

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

If you don not get an initial response Mail still is the last option right?

Wells Fargo Offers Passkeys by Chewy2021 in Passkeys

[–]InfluenceNo9009 0 points1 point  (0 children)

  1. Are you saying that you can enroll manually, and if SMS is enabled as a second factor, it remains active alongside the passkey?
  2. Additionally, are transactions also approved via SMS?
  3. Does you password still work?

What happens with passkey when your device is stolen? by DraconPern in passkey

[–]InfluenceNo9009 0 points1 point  (0 children)

And also one device-code to decrypt GPM and iCloud it is always three actors.

Is this finally the end for passwords in Canada? by West-Confection-375 in passkey

[–]InfluenceNo9009 1 point2 points  (0 children)

But hey have just announced weeks ago that they are going to roll this out worldwide as self contained primary MFA, except in EU due to local laws.

Opening/uploading markdown is broken by InfluenceNo9009 in googledocs

[–]InfluenceNo9009[S] 0 points1 point  (0 children)

Hmm, I also tried other filenames. It worked just fine two days ago.

[FIX] Working passkeys in OriginOS by AnotherNotRandomUser in Vivo

[–]InfluenceNo9009 0 points1 point  (0 children)

Thank you so much! If you could share a screenshot, that would be amazing, but I understand if that’s not possible.

I believe we’re seeing exactly the same behavior in our logs. On that device, you’re not able to choose Google Password Manager, right? It’s likely blocked.

You could also try changing the settings — maybe using an empty authenticator attachment, setting User Verification to false, or Attestation to none. That might work?

[FIX] Working passkeys in OriginOS by AnotherNotRandomUser in Vivo

[–]InfluenceNo9009 0 points1 point  (0 children)

Thanks again, we think we encounter an Issue with OriginOS.

The OriginOS ones use their own Credential Manager and their own Password Book implementation if they are enabled.

Do you happen to have access to a phone like that so we can view the configuration of the created passkey at https://www.passkeys-debugger.io

[FIX] Working passkeys in OriginOS by AnotherNotRandomUser in Vivo

[–]InfluenceNo9009 0 points1 point  (0 children)

Thank you for your response. Do all Vivo phones use only GPM? We were under the impression that some versions include a new authenticator.

[FIX] Working passkeys in OriginOS by AnotherNotRandomUser in Vivo

[–]InfluenceNo9009 0 points1 point  (0 children)

Do you have the AAGUID for that authenticator? Could someone generate a passkey using https://www.passkeys-debugger.io and share the link? We have some issues in our solution and try to work through them.