[Openid-specs-fapi] Issue #163: more description of the security model (openid/fapi)

Joseph Heenan issues-reply at bitbucket.org
Wed Aug 15 10:59:55 UTC 2018


New issue 163: more description of the security model
https://bitbucket.org/openid/fapi/issues/163/more-description-of-the-security-model

Joseph Heenan:

As per discussion on https://bitbucket.org/openid/fapi/issues/150/mandate-at_hash-check-in-the-id-token-from it may be worth adding a description of the security model:


> I wonder if we should explain the full security model somewhere, unless it's already covered somewhere else?

> The way I see it there's a chain here where a weakness at any point could allow a rogue access token in:

> discovery - protected by TLS cert, but I presume a client generally only fetches this once

> jwks_uri - obtained from discovery, protected by TLS cert and refreshed frequently

> id_token - validated by keys from jwks_uri

> access token - validated by hash from id_token

> That would tend to imply that we should make it clear that discovery & jwks_uri endpoints are both on a 'secure' server and (as Nat had suggested before) that people should look at techniques like TLS certificate pinning, DNSSEC, etc, etc.

> It all depends on how far we want to go. e.g. openbanking neither recommend certificate pinning (at least as far as I can see in the security specification), and I believe all bank jwks uris are hosted on a host under openbanking.org.uk, and that domain doesn't appear to have DNSSEC setup.




More information about the Openid-specs-fapi mailing list