[Openid-specs-fapi] Issue #706: Unclear section 5.4 of FAPI2 security profile (openid/fapi)

Judith Kahrer judith.kahrer at curity.io
Fri Aug 16 11:43:45 UTC 2024


Hi Dag,

the AS may use PS256 (RSASSA-PSS using SHA-256 and MGF1 with SHA-256) that is an RSA signature scheme: https://datatracker.ietf.org/doc/html/rfc7518#section-3.5
And, if doing so shall use a key with a minimum length of 2048 bits.

The AS may also use ES256 using a key with a minimum length of 160 bits.
Or, the AS may use EdDSA with Ed25519 (implies a key length of 256 bits).

There is no need for a new bullet point. Ed25519 is specific for EdDSA (a subtype of the same) and not applicable for PS256 nor for ES256.

> On 16 Aug 2024, at 13:06, dag.sneeggen via Openid-specs-fapi <openid-specs-fapi at lists.openid.net> wrote:
> 
> New issue 706: Unclear section 5.4 of FAPI2 security profile
> https://bitbucket.org/openid/fapi/issues/706/unclear-section-54-of-fapi2-security
> 
> Dag Sneeggen:
> 
> I was reading [https://openid.net/specs/fapi-2\_0-security-profile-ID2.html#name-cryptography-and-secrets](https://openid.net/specs/fapi-2_0-security-profile-ID2.html#name-cryptography-and-secrets) today and this section is unclear to me.
> 
> The way it’s structure leads me to think that all AS have to use only elliptic keys for JWTs, but then later in the section it also mentions RSA keys.
> 
> The reason I’m confused is because there are 4 main subsections: \(omitted parts for clarity\)
> 
> 1. **Authorization Servers**, Clients, and Resource Servers when **creating or processing JWTs shall**
> 
>    1. adhere to \[[RFC8725](https://openid.net/specs/fapi-2_0-security-profile-ID2.html#RFC8725)\]
>    2. **use** `PS256`**,** `ES256`**, or** `EdDSA` **\(using the** `Ed25519` **subtype\) algorithms**
>    3. not use or accept the `none` algorithm
> 
> 2. **RSA keys shall have a minimum length of 2048 bits**.
> 3. Elliptic curve keys shall have a minimum length of 160 bits.
> 4. 128bit entropy section.
> 
> Does this mean that AS must only use EC keys for JWTs? or is section 1b here only applicable `Ed25519` keys?
> 
> If AS must only use EC keys for JWTs then why does section 2 mention RSA keys?
> 
> Should there be a new “top-level” section between 3 and 4 that says something like “Elliptic curve subtype `Ed25519` shall use `PS256`, `ES256`, or `EdDSA` algorithms" - is this the intent?
> 
> _______________________________________________
> Openid-specs-fapi mailing list
> Openid-specs-fapi at lists.openid.net
> https://lists.openid.net/mailman/listinfo/openid-specs-fapi

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-fapi/attachments/20240816/8367263b/attachment.html>


More information about the Openid-specs-fapi mailing list