[Openid-specs-risc] Call notes
Atul Tulshibagwale
atul at sgnl.ai
Tue Sep 26 19:08:07 UTC 2023
Hi all,
Here are the notes from today's meeting. They are also stored here
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20230926>.
Thanks to all who attended,
Atul
--
<https://sgnl.ai>
Atul Tulshibagwale
CTO
<https://linkedin.com/in/tulshi> <https://twitter.com/zirotrust>
<atul at sgnl.ai>
WG Meeting: 2023-09-26
<https://hackmd.io/tXJMrxV4TcKKY7XByg2w8Q?view#Agenda>Agenda
- https://github.com/openid/sharedsignals/pull/121
<https://hackmd.io/tXJMrxV4TcKKY7XByg2w8Q?view#Attendees>Attendees
- Atul Tulshibagwale (SGNL)
- Apoorva Deshpande (Okta)
- Tim Cappalli (Microsoft)
- Shayne Miel (Cisco)
- Yair Sarig (VMWare)
- Victor Lu ()
- Phil Hunt (Independent Id)
- Sean O’Dell (independent)
<https://hackmd.io/tXJMrxV4TcKKY7XByg2w8Q?view#Notes>Notes
<https://hackmd.io/tXJMrxV4TcKKY7XByg2w8Q?view#PR-121>PR 121
<https://github.com/openid/sharedsignals/pull/121>
- The audience claim in a Stream’s events, the Receiver must be able to
specify the audience (i.e. the value of the aud claim in the events)
- (Shayne) It was originally Transmitter specified because it was tied
to the bearer token. Now that we are decoupling authorization from the
stream identification, we can make it Receiver specified
- (Yair) If the Receiver can specify the audience, then a Receiver can
specify an audience for some other Receiver. If it is completely determined
by the Receiver, then it opens up the possibility of abuse.
- (Atul) Can we append the stream Id to the Receiver specified audience?
- (Phil) Any automatic binding may create utility issues, because the
actual receiver may not be the one that the Transmitter sends it to
- (Phil) If in a customer config, you set up a project, I’m going to
specify the audience in “*.example.com”,…, so there should be some OOB
way for the Transmitter to determine the audience for each registered
client.
- (Yair) Can we add another claim in the event that identifies the
stream?
- (Phil) I’m differentiating streams with different access tokens, each
of which is bound to one stream
- (Phil) So you could have a token returned in the stream configuration,
which is stream-specific. When you need to renew, you can get the stream
configuration again, and get a new token.
- (Shayne) In the POLL model, the Transmitter must specify different
endpoints for each stream.
- (Sean) In our case the audience is Transmitter supplied, and the
authorization token is bound to an audience.
- (Apoorva) It’s not just audience, the delivery endpoint could be
changed to some other stream. We are not solving anything by just talking
about audience here.
- (Phil) The security consideration has to be that the Tx and Rx must be
able to figure out between themselves which stream each event is meant for
- (Yair) Aud claim is a security consideration, so it should not be
determined by the Receiver. The Transmitter can set another claim in the
event to disambiguate if necessary.
- (Atul) Would having a unique identifier in the POLL endpoint satisfy
the requirement?
- (Apoorva) There would need to be some out of band communication about
what the Audience should be. We should then make it clear in the spec. We
must require that the Transmitter doesn’t have the same audience for
multiple receivers.
- (Sean) JWT signatures help disambiguate the issuer.
- (Phil) Impersonation is handled by signature. Re-using the JWT meant
for someone else is still possible.
- (Apoorva) There is not logical concept of a Receiver in the spec(!)
- (Phil) Having the audience to be Transmitter supplied restricts the
spec to not allow certain use cases.
- (Shayne) Security Events situation is a different use case than
getting access tokens. It hard to use a fake token in access token
situations. But with SETs, we’re doing other things, the threat model is
fairly different. We have to consider what is the actual threat model.
- (Phil) What I’m describing is that the core claims in JWT are still
the same, e.g. the audience. If you are putting restrictions on the aud
claim that is unlike how it is used in JWT, you should define a new claim.
- (Phil) The JWT spec simply says that the value of the aud claim should
be what the Receiver expects it to be.
- (Atul) Need to end call. We do not have consensus yet.
<https://hackmd.io/tXJMrxV4TcKKY7XByg2w8Q?view#Action-Items>Action Items
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20230926/b49a0de1/attachment-0001.html>
More information about the Openid-specs-risc
mailing list