Hi Vladimir, 

 

Thanks for the quick response and review. 

 

> 

> 1. alg:none request JWTs being no longer permitted

> 

 

I think it is a bug of the OpenID Connect Core 1.0. 

 

Request Object itself can be alg=none in OAuth JAR draft 08 as well. 

 

If alg=none, it MUST NOT be passed by value using `request` parameter. 

It is fine to be that way as long as you pass it by reference. 

 

Like OAuth JAR draft-08, OpenID Connect used to have a section dedicated to
"Request Object" if I remember correctly. However, during the re-factoring,
it was subsumed in "5.5.  Requesting Claims using the "claims" Request
Parameter" and the statement about allowing alg=none in Request Object that
are passed by value sneaked in there. 

 

I am going to file a bug report for OpenID Connect on this. 

 

Or, do you have any specific use case for keeping "alg=none" for the
"passing by value" case?


>

> 2. HTTPS request_uri's becoming always required, though there is confusion
about that (see below).

> 

 

I should remove the statement in 5.2.1., as it just meant to have repeated
what it was said in 5.2. 

 

I should also add further condition in 5.2. so that it becomes: 

 

```

unless the target Request Object is signed in a way that is

verifiable by the Authorization Server and the channel is 

protected so that network attacker cannot observe. 

```

 

What do you think? 

 

Nat

 

--

PLEASE READ :This e-mail is confidential and intended for the

named recipient only. If you are not an intended recipient,

please notify the sender  and delete this e-mail.

 

From: OAuth [mailto:[email protected]] On Behalf Of Vladimir Dzhuvinov
Sent: Thursday, August 4, 2016 6:59 PM
To: [email protected]
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-jwsreq-08.txt

 

Thanks Nat.

It looks like draft-ietf-oauth-jwsreq-08.txt is breaking with OpenID Connect
in regard to

1. alg:none request JWTs being no longer permitted

2. HTTPS request_uri's becoming always required, though there is confusion
about that (see below).



I don't know if this is intentional.



Quoting the original Connect spec on alg:none:

http://openid.net/specs/openid-connect-core-1_0.html#RequestObject

```
The Request Object MAY be signed or unsigned (plaintext). When it is
plaintext, this is indicated by use of the none algorithm
<http://openid.net/specs/openid-connect-core-1_0.html#JWA> [JWA] in the JOSE
Header. 
```


There is also confusion about the requirement to have HTTPS, which in 5.2 is
conditionally required, and in 5.2.1 always required (the 5.2.1 edit
appeared in -08).

https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-08#section-5.2

```

The contents of the resource referenced by the URL MUST be a Request
Object.  The scheme used in the "request_uri" value MUST be "https",
unless the target Request Object is signed in a way that is
verifiable by the Authorization Server. 
```


https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-08#section-5.2.1

```

The URL MUST be HTTPS URL.

```


Cheers,

Vladimir


-- 
Vladimir Dzhuvinov 

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to