[Openid-specs-ab] Spec Call Notes 13-Aug-20

Mike Jones Michael.Jones at microsoft.com
Thu Aug 13 15:20:09 UTC 2020


Spec Call Notes 13-Aug-20

Tim Cappalli
Brian Campbell
Mike Jones
Tom Jones
Filip Skokan
Joseph Heenan
George Fletcher
Bjorn Hjelm

OAuth JAR
              Being discussed on the IESG Telechat right now
              There were no objections from the IESG - just comments
              (Nat and John are on the Telechat right now)
              They achieved approval with AD follow-up
                           Nat needs to respond to the comments
              Brian wanted security considerations prohibiting use of the "sub" with a Client ID value
                           Since that would allow repurposing the JWT for client authentication
              Some of the ADs asked for an explanation of why explicit typing was not included
                           We could optionally allow explicit "typ" typing with the defined MIME type, but not require it
              Nat requested that people create a PR addressing the AD comments
                           https://bitbucket.org/Nat/oauth-jwsreq/src/master/draft-ietf-oauth-jwsreq.xml
                           Mike volunteered

Adopting RP-Initiated Logout Spec
              No objections were raised, so the spec is now adopted

Aggregated Claims Draft
              No objections were raised, so the spec is now adopted

"alg":"none" and Certification
              Joseph asked about the Certification suite requiring the use of alg:none in some cases
              Certification passes "request" values using alg:none
              Certification passes "request_uri" values using alg:none
              The certification suite doesn't ever require unsigned ID Tokens, which are allowed for response_type=code
              Filip suggests using whatever algorithm is available
                           The metadata can indicate support for none or not
              request_object_signing_alg_values_supported
                           The spec says "Servers SHOULD support none and RS256."
                           Mike asserted that it's an interop issue if none is not supported
              George made an analogy to supporting open dynamic client registration
                           As a security decision, AOL wouldn't want to deploy it that way, even though certification requires it
              Mike asserted that there's not a security issue with using unsigned Request Objects
                           Joseph countered that the issue is having support for none in the underlying JOSE library at all
              Joseph asked about passing raw JSON rather than an unsigned JWT
                           Mike said that that isn't supported by the spec
              Joseph asked about using PAR instead
                           Mike said that it's not a standard yet and there's not support for it in Connect today
              Filip suggested making the unsigned Request Object tests optional
                           Bjorn agreed with Filip's comments
              Brian said that alg:none has given JOSE an unduly bad name
                           He thought that certifying should not require support of alg:none
              Nat thinks that certifying without supporting alg:none should be OK
              Mike suggested having two sets of Request Object tests - one for none and one for RS256
                           Mike would still like to test none, when available
                           Joseph said that the unsigned one can go to a skipped state if none isn't listed in the metadata
              We agreed to hand this off to the certification team to work out the details of the implementation change

logout_hint Proposal
              Issue #1182 - Add logout_hint parameter to RP-Initiated Logout request
              https://bitbucket.org/openid/connect/issues/1182/add-logout_hint-parameter-to-rp-initiated
              George said that the login_hint should never bypass the person entering credentials
                           He said that the ID Token is more secure
              Brian said that the use of the ID Token in backwards flows is problematic
                           He said that their implementation doesn't have a place to store the ID Token
              Mike said that the logout_hint would only be used to select among logged-in sessions
                           The user would still be asked whether they want to log out or not
              George reminded us that we have a sid parameter on Back-Channel but not Front-Channel
                           He said that if we add parameters, we should make sure to cover all the use cases
              We ran out of time to finish the discussion
                           Mike suggested that people add comments to the issue

Open Issues
              https://bitbucket.org/openid/connect/issues?status=new&status=open
              (We ran out of time so no additional open issues were discussed)

Next Call
              The next working group call is Monday, August 17 at 4pm Pacific Time
                           This is the call primarily devoted to SIOP issues
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20200813/cf85698e/attachment.html>


More information about the Openid-specs-ab mailing list