The English version of this specification is the only normative version. Non-normative translations may also be available.
Copyright © 2015-2017 FIDO Alliance All Rights Reserved.
FIDO-compliant relying parties may wish to offer tailored user interfaces based on the transports a FIDO U2F authenticator supports. This standard describes one way relying parties may learn which transports an authenticator supports, by allowing authenticator vendors to embed hardware features as an optional extension in the authenticator’s attestation certificate.
This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current FIDO Alliance publications and the latest revision of this technical report can be found in the FIDO Alliance specifications index at https://www.fidoalliance.org/specifications/.
This document was published by the FIDO Alliance as a Proposed Standard. If you wish to make comments regarding this document, please Contact Us. All comments are welcome.
Implementation of certain elements of this Specification may require licenses under third party intellectual property rights, including without limitation, patent rights. The FIDO Alliance, Inc. and its Members and any other contributors to the Specification are not, and shall not be held, responsible in any manner for identifying or failing to identify any or all such third party intellectual property rights.
THIS FIDO ALLIANCE SPECIFICATION IS PROVIDED “AS IS” AND WITHOUT ANY WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY EXPRESS OR IMPLIED WARRANTY OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
This document has been reviewed by FIDO Aliance Members and is endorsed as a Proposed Standard. It is a stable document and may be used as reference material or cited from another document. FIDO Alliance's role in making the Recommendation is to draw attention to the specification and to promote its widespread deployment.
Type names, attribute names and element names are written as code
.
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in [RFC2119].
Attestation certificates are X.509 certificates. Transports supported by an authenticator can be embedded as an extension in the authenticator's attestation certificate. As certificate extensions are only available since [X509V3], the attestation certificate's version MUST be v3.
As such, this specification is a profile of [RFC5280] which is itself a profile of the ISO/IEC/ITU-T [X509V3] specifications for public key certificates. All syntax and semantics are inherited from those specifications unless explicitly documented otherwise. In this document, all fields are defined in ASN.1 and MUST be DER-encoded ([X690]).
The FIDO OID arc and its FIDO U2F OID subarc are defined as:
-- FIDO Alliance’s OID id-fido OBJECT IDENTIFIER ::= 1.3.6.1.4.1.45724 -- FIDO U2F protocol OID id-fido-u2f OBJECT IDENTIFIER ::= { id-fido 2 }
The FIDO U2F certificate extensions arc is defined as:
-- FIDO U2F certificate extensions arc id-fido-u2f-ce OBJECT IDENTIFIER ::= { id-fido-u2f 1 }
This extension is identified by id-fido-u2f-ce-transports
and specifies the transports supported by the authenticator. It's a
non-critical extension and therefore FIDO clients and relying parties
MAY ignore it, if present.
The FIDO U2F certificate transports extension is defined as:
-- FIDO U2F certificate extensions id-fido-u2f-ce-transports OBJECT IDENTIFIER ::= { id-fido-u2f-ce 1 } fidoU2FTransports EXTENSION ::= { WITH SYNTAX FIDOU2FTransports ID id-fido-u2f-ce-transports } FIDOU2FTransports ::= BIT STRING { bluetoothRadio(0), -- Bluetooth Classic bluetoothLowEnergyRadio(1), uSB(2), nFC(3), uSBInternal(4) }
SEQUENCE | 30 13 OBJECT IDENTIFIER | 06 0B value: id-fido-u2f-ce-transports | 2B 06 01 04 01 82 E5 1C 02 01 01 OCTET STRING | 04 04 BIT STRING | 03 02 unused bits: 7 | 07 value: 0x80 | 80
SEQUENCE | 30 13 OBJECT IDENTIFIER | 06 0B value: id-fido-u2f-ce-transports | 2B 06 01 04 01 82 E5 1C 02 01 01 OCTET STRING | 04 04 BIT STRING | 03 02 unused bits: 4 | 04 value: 0x30 | 30