-
Notifications
You must be signed in to change notification settings - Fork 234
Description
Although Credential IDs and credential public keys are necessarily shared with the WebAuthn Relying Party to enable strong authentication, they are designed to be minimally identifying and not shared between Relying Parties.
But they are designed to specifically be shared with any related origin, which could include hundreds of other relying parties if they are collaborating.
Related origins don't seem to be mentioned in any privacy considerations. How could this feature be abused? Can origin lists be updated over time? Will the origins actually be related companies, or just colluding? Will the user know that if they use their passkey on this totally differently named and branded site that it will provide hard proof that it's the same user on what seems to be a totally different site? Will silent access be allow for related origins if a user asked to stay signed in? Enabling cryptographically-verified identity-sharing between many origins is a substantial privacy risk, with the potential for unwanted cross-site recognition.
How does this feature relate to every other web proposal for related websites? For example, it seems to have fewer restrictions, substantive protections than the first-party sets proposals. Should websites that use one related-origins feature use the same list of origins as they do in the other related-origins features?
We were also confused about the exact implications of registrable origin labels (vs eTLD+1, or other known concepts).
Setting a minimum of 5 and no maximum is confusing. Why 5? Leaving it ambiguous doesn't seem to help interoperability. Having a minimum but no maximum doesn't seem to help privacy. (It seemed like implementations were converging on 5 as just both floor and ceiling?)
This item was raised and discussed by the Privacy WG as part of this privacy review:
w3cping/privacy-request#162