> http://tools.ietf.org/html/draft-jones-oauth-proof-of-possession-00


A new registry for "cnf" members is a bit strange. A JWT Claim Set has so far 
been a flat structure, with metadata such expiry date "exp" alongside claims 
such as "given_name". This spec starts introducing structure by wrapping 
members in a "cnf" (confirmation) object. It is not clear to me which new 
things would go in "cnf" versus going in to the top-level of the JWT claim set. 
Both locations have a "MUST ignore" policy for unrecognized members.


   "(In some applications, the subject identifier will be relative
   to the issuer identified by the "iss" (issuer) claim.)"

This isn’t very helpful as it gives no hint about when this is or isn’t the 
case. I guess this is just rewording a flaw from JWT.


Could the JWE example please include a "kid"? The recipient needs to know which 
key to use to decrypt the message. JWS says we SHOULD do this [JWS §6 2nd 
paragraph]. [P.S. Weren’t we going to include "kid" is almost all the examples 
in JWE?]

You may as well drop the "cty":"jwk+json" member as this is implied by the JOSE 
message being the value of a "jwk" member.


OpenID Connect has already defined a "sub_jwk" field that performs a similar 
role to "cnf":{"jwk"}.
[http://openid.net/specs/openid-connect-core-1_0.html#SelfIssuedResponse]


Perhaps the biggest security consideration is missing: "cnf" may be ignored. A 
recipient that doesn't understanding "cnf" is likely to accept a JWT as a 
bearer token without doing any proof-of-possession.

--
James Manger
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to