@@ -196,11 +196,11 @@ be new models listed. In order to do that, run the `bin/updateMetadata.php` scri
196196like this:
197197
198198``` bash
199- % php bin/updateMetadata.php < MDS_TOKEN >
199+ % php bin/updateMetadata.php < blob file >
200200```
201201
202- where ` MDS_TOKEN ` is the API token you get after registering
203- [ here] ( https://mds2 .fidoalliance.org ) .
202+ where ` <blob file> ` is the metadata JWT blob you get from
203+ [ here] ( https://mds3 .fidoalliance.org ) .
204204
205205As a consequence, depending on the token model the user uses, even if the AAGUID
206206is being sent as part of the registration process, it may be that the device is
@@ -238,8 +238,7 @@ the authenticator AND to have unlocked the authenticator with a personal asset
238238such as PIN or fingerprint). Both variants are considered sufficient to
239239authenticate successfully (§7.1 steps 11 and 12 are joined into one condition)
240240
241- The implementation requests ECDSA keys (algorithm -7) because all Yubikeys
242- support that. It is trivial to add RSA support if there are keys which don't.
241+ The implementation requests ECDSA and RSA keys (algorithms -7, -257).
243242
244243The implementation does not request any client extensions. The specification
245244gives implementations a policy choice on what to do if a client sends extensions
@@ -253,7 +252,7 @@ For the attation type "packed / x5c",
253252* the optional OCSP checks are not performed (this is explicitly permitted in
254253 the spec due to other means of revocation checking in the FIDO MDS).
255254
256- For bith "packed / x5c" and "fido-u2f":
255+ For both "packed / x5c" and "fido-u2f":
257256* due to the lack of any externally provided knowledge about CAs(???) all
258257 attestations are classified as "Basic" (i.e. no "AttCA" level)
259258
0 commit comments