-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(discussion) strongbox key storage limitations #27
Comments
Hi! We have not encountered any issues with regards to the amount of keys created. Now, even if this limitation is not there (which it might be, but we have not encountered it, yet), we will still have an issue with authenticating to the secure enclave for batch issuance. With batch issuance, we need to create N keys for N credentials, which will also in turn have us prompt the user N times to authenticate with biometrics, a terrible UX. There are some experiments going on which would allow us to create a single hardware-backed key pair and, provable, derive new keys from that. I am not a 100% sure that is will be LoA high, but we cannot prompt the user multiple times for every credential in the batch. Hopes this helps a bit! |
@berendsliedrecht thnx for the info, useful to know. I haven't ran into #keys limitation issues either yet fwiw. Those experiments sound interesting, do you have any pointers to where that is happening? no worries if not. Sounds like what the ARF is alluding to in it's high level requirements, but unfortunately the ARF doesn't really explain how:
|
I believe the following issue+pr is relevant, but it has been a bit since I last looked at them. The ARF currently, indeed, does not explain how sadly. I assume it will take some time before the ARF mentions this. It is quite a new feature. Also, I am not sure whether this will be the end solution, it might be a solution, but not the definitive one. |
Hi, I got notified about this thread because of the mention of the OpenID4VCI issue I opened. Good to see more open source implementations of secure area interfacing. My notes about this topic might be of interest to you as well: Wallet Secure Cryptographic Commons.
We have designed HDK to achieve LoA High. See ETSI TR 119 476 v1.2.1 § 4.4.4.2 for details.
See Topic B for the planned ARF update. Once ZKP from Topic G is sufficiently developed for all relevant use cases, interop on HDK may not be needed anymore. |
I see strongbox is being utilised for Android, which is great. Was wondering if there is any concerns or insights the devs could share about usage of the strongbox enclave in practice, e.g. in practice is there some maximum number of keys that can be created on strongbox?
I can’t seem to find straight answers for that question, likely Bcus it’s HSM chip/manufacturer dependent. chatgpt seems to think it’s in the 50-100 range… but surely that won’t go far when considering EUDI use cases of batch issuance of high assurance creds.. is there something I’m missing about how ARF expects this usage to be achieved (given they call out Strongbox as a WSCD)?
Thanks in advance for your input!
@TimoGlastra @berendsliedrecht
(P.S. i also posted in credo discord, but i think it's been lost: https://discord.com/channels/1022962884864643214/1179453305856991263/1326145311961382984)
The text was updated successfully, but these errors were encountered: