[Openid-specs-ab] Issue #1567: `nonce` validation with nested verifiable presentations (openid/connect)

Thomas Bellebaum issues-reply at bitbucket.org
Wed Jul 20 14:48:01 UTC 2022


New issue 1567: `nonce` validation with nested verifiable presentations
https://bitbucket.org/openid/connect/issues/1567/nonce-validation-with-nested-verifiable

Thomas Bellebaum:

From the Section on “Preventing Replay Attacks”:

> To prevent replay attacks, verifiable presentation container objects MUST be linked to client\_id and nonce from the Authentication Request. The client\_id is used to detect presentation of credentials to a different party other than the intended. The nonce value binds the presentation to a certain authentication transaction and allows the verifier to detect injection of a presentation in the OpenID Connect flow, which is especially important in flows where the presentation is passed through the front-channel.
>
> Note: These values MAY be represented in different ways in a verifiable presentation \(directly as claims or indirectly be incorporation in proof calculation\) according to the selected proof format denoted by the format claim in the verifiable presentation container.

Assume a RP is returned a Verifiable Credential inside a Verifiable Presentation Container inside another Verifiable Presentation Container. \(Yes, this is valid according to DIF.PresentationExchange, see also https://github.com/decentralized-identity/presentation-exchange/issues/355\).

Should we specify which VP should be signed by the holder and which should involve the nonce? There seems to be no mention of a nonce in Presentation Exchange other than

> Other protocols may require that a presentation be bound to a particular communication exchange or session. In these cases, a Presentation Request that provides a domain, challenge, or nonce value may be required.

In particular, it does not specify how to validate that a nonce was used.




More information about the Openid-specs-ab mailing list