Information Security
challenge-response webauthn fido2
Updated Mon, 01 Aug 2022 13:36:31 GMT

Why does WebAuthn require a challenge when asking the client to register a new credential?


When registering a new credential as part of WebAuthn, why does the client need to be sent a challenge?

Presumably this is to prevent a replay attack, but wouldn't a replay attack be prevented by TLS already?




Solution

I've asked around a lot about this and haven't been able to find a definitive answer. However, I think the challenge is needed for the following reason:

Replay attacks should mostly be prevented by TLS, but as mentioned here and here it is still possible to execute a replay attack even with TLS by fooling the user or the user's browser to retry a request. Thus, this challenge helps cover a gap in TLS's replay prevention mechanisms.

For example, an attacker could compromise a user's identity in the following scenario if the challenge wasn't required:

  1. A user tries registering a new credential.
  2. That request is held by a man in the middle and a TCP reset is sent to the user's browser.
  3. The user's browser retries the request and successfully registers the new credential.
  4. Within a short period of time, the user decides to deregister their credential.
  5. Again within a short period of time, the man in the middle releases the original request to the server and thus, the credential is re-registered without the user's knowledge.

  6. Sometime later, the man in the middle steals the user's FIDO2 authenticator.

  7. The man in the middle can now pose as the user.

Update

After realizing that a replay attack doesn't have to occur as a result of a compromised node in the network but could also occur as a result of a compromised operating system or compromised browser, I thought of the following example that would be possible without a challenge during registration:

  1. An attacker gains control of a user's browser.
  2. A user registers a new credential and the compromised browser intercepts the PublicKeyCredential before sending it to the server.
  3. The attacker steals the user's FIDO2 authenticator.
  4. The user deregisters their credential.
  5. When the user goes to register a new credential, the compromised browser sends the old PublicKeyCredential instead of a new one.
  6. The attacker can now pose as the user.

A very similar scenario could occur if the user's operating system was compromised and a challenge wasn't used during registration.

Also, these scenarios would only be relevant if a relying party required that registration/authentication be executed with a particular device that the attacker couldn't easily crack.