[Openid-specs-ab] SIOP special topic call notes (2021-08-10)

Kristina Yasuda Kristina.Yasuda at microsoft.com
Thu Aug 12 06:33:47 UTC 2021


Nat Sakimura
Tim Cappalli
Michael Barrett
Jeremie Miller
Tom Jones
David Waite
Jace Hensley
Edmund Jay
Brian Richer
Kristina Yasuda

- Introductions/re-introductions

  *   Jace works at Bloom, involved in a WACI spec

- Events/External orgs

      - DIF Interop WG: call on WACI planned this Thursday - interop testing. Note that this call is NOT IPR protected, so anyone can join: https://github.com/decentralized-identity/interoperability/blob/master/agenda.md

      - DIF Presentation Exchange/OIDF WG call on Wed 11th at 1PM PT

      - DIF Wallet Security WG re-starting after 3 weeks of holiday break


- PRs

  *   SIOP V2 introduction and use-cases: https://bitbucket.org/openid/connect/pull-requests/41
     *   we agreed to merge this PR
  *   removing vp_hash in OIDC4VP: https://bitbucket.org/openid/connect/pull-requests/42
     *   we agreed to give a little more time to for the review


- Discussion (great discussion, would encourage to read and take a look at the diagram)

  *   Client_id in SIOP V2 https://bitbucket.org/openid/connect/issues/1272/client-identifier-in-siop-when-the-dids
     *   We discussed the proposal how client_id can be resolved by SIOP to obtain RP registration metadata
     *   DW presented the proposal using a sequence diagram: https://hackmd.io/@dwaite/SJRMV4jyY
        *   Describes how to use Entity Statements defined in OpenID Federation spec with SIOP: https://openid.net/specs/openid-connect-federation-1_0.html<https://openid.net/specs/openid-connect-federation-1_0.html#rfc.section.5> (Sections 5, 6, 7, 9 are most relevant)
        *   Entity Statement (ES) is 1/ self-signed; 2/ can be about RP (conventionally used to be about OP); 3/ can have a chain of authority (supports trust frameworks and federations of parties who have agreed to certain terms, etc.), so that they allow just-in-time registration when interaction occurs.
        *   signed request objects are mandated for automatic registration (clarification for the OpenID Fed team pending)
        *   The diagram would not change even if DIDs are used instead of ES!
     *   Registration parameter in SIOP right now does not give authoritative metadata like ES would
     *   OpenID Federation does not limit authorities to HTTPS, so it only needs a way to resolve to an ES, and does not need to be hosted - would work for custom URLs or HTTPS universal links
        *   Minimal SIOP implementation does not need to require resolving authority_hint in ES and going up the trust chain
     *   using Automatic Registration section of OpenID Federation and DID Resolution section of DID-CORE would address comments made during the last call to be careful with clarifying expected behaviour with this new usage of client_id
     *   Issues to be filed (DW)
        *   1. Remove registration parameters in SIOP V2, as it opens up a security hole, and since Automatic Registration would be a better defined, more secure mechanism.
           *   Registration parameter allows to declare additional redirect_uris to override legitimate ones in the request object.
        *   2. SIOP metadata discovery (simplified version of OpenID Federation Metadata ES)
           *   no OP jwks
           *   should be only one metadata file per SIOP
        *   3. define a more abstract mechanism for resolving a subject identifier of a SIOP (currently jwk thumbprint or DID) inspired by OpendID Federation ES
           *   with an expectation that JWK set is available after the resolution. define as algorithms that can be used with the existing crypto tools
           *   might include Solid, OpenID Connect Web fingerprint, etc. ?

Issues

  *   SIOP V2
     *   Security Considerations: https://bitbucket.org/openid/connect/issues/1269/add-security-considerations-for-cross<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbitbucket.org%2Fopenid%2Fconnect%2Fissues%2F1269%2Fadd-security-considerations-for-cross&data=04%7C01%7CKristina.Yasuda%40microsoft.com%7C0e97c31cf7894a31be4508d950d34339%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637629690781019460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=okTAjch1DqHOvE3Su34gY%2FeU1sUryxrvS7FcBXlw%2FOA%3D&reserved=0>
        *   Kristina shared a preliminary list of security attacks and mitigations identified so far
           *   Credential phishing, SIOP phishing (relay of a QR code), Open redirect, POST where the content becomes public, Server-side request forgery
     *   Using WebAuthn to mitigate cross-device SIOP security risk: https://bitbucket.org/openid/connect/issues/1273/mitigating-security-risk-by-using-webauthn
        *   Tim said that a small group has met and they plan to share the outcome of the discussion soon.

     *


Best,

Kristina





-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20210812/3fdb5169/attachment.html>


More information about the Openid-specs-ab mailing list