Review of Proposed Implementer’s Draft of OpenID 2.0 to OpenID Connect Migration Specification

Torsten Lodderstedt torsten at lodderstedt.net
Sun Sep 21 16:37:50 UTC 2014


Hi Mike,

here are my review comments:

section 2

PPID and openid2_realm:
"If PPID was used to obtain the OpenID 2.0 Identifier" - How is the RP 
supposed to know/find out whether the OP issued a PPID or a 
universal/global OpenID? I would rather suggest to make this a mandatory 
parameter, the RP must know its OpenID 2.0 realm anyway.

"If the value of openid2_id is an XRI [XRI_Syntax_2.0], the mechanism 
for verifying the iss in the ID Token is still TBD" - Do you want to 
determine this before the spec is published? If not I would suggest to 
replace the TBD by "... is out of scope for this specification."

"There could be an attack by a malicious RP to obtain the user’s PPID 
for another RP to perform identity correlation. To mitigate the risk, 
the OP MUST verify that the realm and RP’s Redirect URI matches as per 
Section 9.2 of OpenID 2.0 [OpenID.2.0]."

section 3

I'm not sure what this means. Does it mean the RP's XRDS document must 
contain the RP’s Redirect URI (a OAuth/OIDC redirect_uri)? If so, is the 
RP supposed to use a certain service Type or 
"http://specs.openid.net/auth/2.0/return_to"?

Example:
<Service xmlns="xri://$xrd*($v*2.0)">
<Type>http://specs.openid.net/auth/2.0/return_to</Type>
   <URI>http://consumer.example.com/return</URI>
</Service>

section 4.1.2

"If a corresponding OpenID 2.0 Identifier is not found for the 
authenticated user, the openid2_id claim in the ID Token MUST have the 
value NOT FOUND." I assume the value must be "NOT FOUND"?

section 6

step 2
"... The server SHOULD return a JSON with iss ..." Why not MUST? 
Otherwise the RP cannot verify whether the OP OP is Authoritative.

step 3
"If the openid2_id does not start with http or https, it is an XRI 
[XRI_Syntax_2.0]. In this case, the RP needs to construct the 
verification URI by concatenating https://xri.net/, the value of the 
openid2_id claim, and /(+openid_iss). Requesting the resulting URI with 
GET will result in a series of HTTP 302 redirects. The RP MUST follow 
the redirects until HTTP status code 200 OK comes back. The URI that 
resulted in 200 OK is the authoritative issuer for the XRI. This URI 
MUST exactly match the iss in the ID Token except for the potential 
trailing slash (/) character."

Doesn't this contradict the note regarding XRI in section 2 (TBD)?

section 8.1

"This standard allows the RP to verify the authenticity of the OpenID 
2.0 Identifier through ID Token even after the OpenID 2.0 OP is taken 
down. To enable this, the OP MUST publish the public keys that were used 
to sign the ID Token with openid2_id claim at the URI that this OpenID 
2.0 Identifier points to."

Where is the relation between the openid2 identifier and the OP's public 
keys?  Public keys are nowhere else mentioned in this spec.

best regards,
Torsten.

Am 17.09.2014 03:10, schrieb Mike Jones:
>
> The OpenID Connect Working Group recommends approval of the following 
> specification as an OpenID Implementer’s Draft:
>
> ·OpenID 2.0 to OpenID Connect Migration 1.0 
> <http://openid.net/specs/openid-connect-migration-1_0-06.html> – 
> Defines how to migrate from OpenID 2.0 to OpenID Connect
>
> An Implementer’s Draft is a stable version of a specification 
> providing intellectual property protections to implementers of the 
> specification.  This note starts the 45 day public review period for 
> the specification drafts in accordance with the OpenID Foundation IPR 
> policies and procedures.  This review period will end on Friday, 
> October 31, 2014.  Unless issues are identified during the review that 
> the working group believes must be addressed by revising the drafts, 
> this review period will be followed by a seven day voting period 
> during which OpenID Foundation members will vote on whether to approve 
> these drafts as OpenID Implementer’s Drafts. For the convenience of 
> members, voting may begin up to two weeks before October 31^st , with 
> the voting period still ending on Friday, November 7, 2014.
>
> This specification is available at:
>
> ·http://openid.net/specs/openid-connect-migration-1_0-06.html
>
> A description of OpenID Connect can be found at 
> http://openid.net/connect/ <http://openid.net/connect/>. The working 
> group page is http://openid.net/wg/connect/ 
> <http://openid.net/wg/connect/>.  Information on joining the OpenID 
> Foundation can be found at 
> https://openid.net/foundation/members/registration. If you’re not a 
> current OpenID Foundation member, please consider joining to 
> participate in the approval vote.
>
> You can send feedback on the specifications in a way that enables the 
> working group to act upon your feedback by (1) signing the 
> contribution agreement at http://openid.net/intellectual-property/ to 
> join the working group (please specify that you are joining the 
> “AB+Connect” working group on your contribution agreement), (2) 
> joining the working group mailing list at 
> http://lists.openid.net/mailman/listinfo/openid-specs-ab, and (3) 
> sending your feedback to the list.
>
> -- Michael B. Jones – OpenID Foundation Board Secretary
>
> (This notice has also been posted at 
> http://openid.net/2014/09/16/review-of-proposed-implementers-draft-of-openid-2-0-to-openid-connect-migration-specification/.)
>
>
>
> _______________________________________________
> specs mailing list
> specs at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs/attachments/20140921/c3f8ea14/attachment.html>


More information about the specs mailing list