[Openid-specs-ab] Spec Call Notes 9-May-19
Filip Skokan
panva.ip at gmail.com
Tue May 28 08:57:30 UTC 2019
That's what the explicit value `None` is for then :)
S pozdravem,
*Filip Skokan*
On Tue, 28 May 2019 at 10:56, nov matake <nov at matake.jp> wrote:
> oh...SAML is dead...
>
> Sent from my iPhone
>
> On May 28, 2019, at 16:35, Filip Skokan via Openid-specs-ab <
> openid-specs-ab at lists.openid.net> wrote:
>
> One additional side-effect of `SameSite=Lax` being the default that isn't
> quite that obvious
>
> The party receiving form_post responses does not get their cookies since
> the request is not a top-level redirect but a POST request from another
> Origin.
>
> Best,
> *Filip*
>
>
> On Thu, 9 May 2019 at 17:36, Filip Skokan <panva.ip at gmail.com> wrote:
>
>> Here are my notes on the new "lax" cookie sameSite value default.
>>
>>
>>> George asked whether this might affect iframe and
>>> postMessage communication
>>> And whether this might affect Session
>>> Management
>>
>>
>> If cookies are set to "Lax" by default then the following will not work
>>
>> - session management 1.0 - Session Status Change Notification - OP
>> cookies won't be loaded resulting in error or changed events
>> - web_message response mode - simple and relay modes with no prompts
>> - OP cookies won't be loaded resulting in no session being loaded and hence
>> error=login_required or similar returned
>> - any hidden iframe prompt=none way of refreshing tokens - OP cookies
>> won't be loaded resulting in no session being loaded and hence
>> error=login_required or similar returned
>> - any hidden iframe prompt=none&response_type=none way of checking
>> for "is the user still authenticated" - OP cookies won't be loaded
>> resulting in no session being loaded and hence error=login_required or
>> similar returned
>> - frontchannel logout 1.0 - relying party iframe - RP cookies won't
>> be loaded resulting in some implementations that depend on cookies to be
>> loaded not being able to drop the RP session
>>
>> I will be moving my OP implementation to use "None" as sameSite value for
>> OP Session Cookie as well Session Management Client State cookies the
>> moment my web framework's cookie interface allows that as value. This will
>> hopefully be ignored by browsers not implementing that value resulting in
>> the old default which is "None" implicitly and will for sure keep existing
>> behaviours for the browsers that do.
>>
>> Best,
>> *Filip Skokan*
>>
>>
>> On Thu, 9 May 2019 at 17:19, Mike Jones via Openid-specs-ab <
>> openid-specs-ab at lists.openid.net> wrote:
>>
>>> Spec Call Notes 9-May-19
>>>
>>>
>>>
>>> Mike Jones
>>>
>>> Roland Hedberg
>>>
>>> Brian Campbell
>>>
>>> Torsten Lodderstedt
>>>
>>> Bjorn Hjelm
>>>
>>> George Fletcher
>>>
>>> Tom Jones
>>>
>>>
>>>
>>> OpenID Certification
>>>
>>> Roland created certification tests for Session,
>>> Front-Channel, and Back-Channel, which are now being tested
>>>
>>> Filip Skokan provided a lot of early feedback on the OP
>>> tests
>>>
>>> We now need instructions for testing so others can do so
>>>
>>> It seems that there will need to be some
>>> browser-specific instructions in some cases
>>>
>>> There are RP logout tests also but they haven't been
>>> tested yet by others than Roland
>>>
>>>
>>>
>>> Authentication Failed Error Code Draft
>>>
>>> This is issue #1029
>>>
>>> The error code is now unmet_authentication_requirements
>>>
>>> Torsten submitted and Mike will publish the working group
>>> draft
>>>
>>>
>>>
>>> OpenID Connect for Identity Proofing
>>>
>>> Another new draft was published at
>>> https://openid.net/specs/openid-connect-4-identity-assurance.html
>>>
>>> Torsten led a discussion at IIW
>>>
>>> A lot of good feedback was received, including on
>>> requirements for other jurisdictions
>>>
>>> It was pointed out that some proofs will require multiple
>>> documents
>>>
>>> Torsten is working on updated syntax for that
>>>
>>> See issue #1082: Support for multiple proof
>>> sources
>>>
>>> Reviews are solicited
>>>
>>> We agreed that Torsten should present this during EIC
>>>
>>>
>>>
>>> EIC Next Week
>>>
>>> Roland, Torsten, Bjorn, George, and Mike will be at EIC
>>> next week
>>>
>>>
>>>
>>> Distinguishing first and third party cookies
>>>
>>> George let us know that there's a spec that adds the
>>> same-site qualifier to cookies
>>>
>>>
>>> https://tools.ietf.org/html/draft-west-cookie-incrementalism-00
>>>
>>> Values are none, strict, and lax
>>>
>>> Also see
>>> https://web.dev/samesite-cookies-explained/
>>>
>>> and
>>> https://blog.chromium.org/2019/05/improving-privacy-and-security-on-web.html
>>>
>>> Google is adding support for this to Chrome
>>>
>>> George asked whether this might affect iframe and
>>> postMessage communication
>>>
>>> And whether this might affect Session
>>> Management
>>>
>>>
>>>
>>> Open Issues
>>>
>>>
>>> https://bitbucket.org/openid/connect/issues?status=new&status=open
>>>
>>> #1083: policy_uri, tos_uri, logo_uri missing in IANA JWT
>>> claims registry
>>>
>>> Brian asked whether Nat really meant the JWT
>>> Claims registry or the AS Metadata registry
>>>
>>> #1081: Need for a persistence user identifier - a PUID
>>>
>>> We discussed that change of keys is a change
>>> of identity for self-issued
>>>
>>> We discussed the ability to add a "did" claim
>>> to the ID Token when it is useful
>>>
>>> We discussed that the "sub" value must not
>>> change at key roll-over time
>>>
>>>
>>>
>>> Transient Subject Identifier Type
>>>
>>> At IIW, Davide Vaghetti talked about the need for a
>>> transient subject_type value, similar to that in SAML
>>>
>>> Mike and John encouraged him to write a specification for
>>> it
>>>
>>>
>>>
>>> Next Call
>>>
>>> The May 13th call is cancelled due EIC
>>>
>>> The next call is Thursday, May 23 at 7am Pacific Time
>>> _______________________________________________
>>> Openid-specs-ab mailing list
>>> Openid-specs-ab at lists.openid.net
>>> http://lists.openid.net/mailman/listinfo/openid-specs-ab
>>>
>> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-ab
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20190528/e2624270/attachment.html>
More information about the Openid-specs-ab
mailing list