-
Notifications
You must be signed in to change notification settings - Fork 3
client to ensure AAG audience makes sense #18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…orization grant makes sense with respect to where it’s being sent.
|
looks like this would cover these two from #14 too:
and
|
| The issuer identifier of the authorization server, | ||
| as defined in <xref target="RFC8414"/>, can be used to indicate that | ||
| the authorization server is a valid intended audience of the assertion. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This deletes the text saying that "The audience value MUST identify the authorization server as the intended audience." This seems like a regression.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This deletes a number of things including the replacement of RFC7521 Section 5.2 so the replacement text is now only updating the metamodel description of the Audience parameter in RFC7521 Section 5.1.
That leaves the text RFC7521 Section 5.2 General Assertion Format and Processing Rules in place:
o The assertion MUST contain an Audience that identifies the
authorization server as the intended audience. The authorization
server MUST reject any assertion that does not contain its own
identity as the intended audience.
| </Assertion> | ||
| ]]></artwork> | ||
| </figure> | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I disagree with deleting the updated example. Having it is useful to readers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In what way is it useful to readers to include a lot of unnecessary intimidating/ugly/arcane XML content to replace a perfectly legitimate example ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In my view, our spec should be replacing all the sections of the specs that it updates that we regard to be a bad practice with respect to the vulnerability. The current published draft already does so. Removing this update to the example would mean that we're no longer doing that, which would be a regression.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Surely we are not replacing entire sections every single time. To that end I am not seeing removing an example from an update that deprecates a particular portion of a spec as a regression.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In my view, our spec should be replacing all the sections of the specs that it updates that we regard to be a bad practice with respect to the vulnerability.
But there is no problem with using the SAML Entity ID, which is what https://www.rfc-editor.org/rfc/rfc7522#section-4 that this would replace does. No change is needed.
| the client is responsible for ensuring that the audience of the JWT assertion | ||
| is appropriate for the authorization server to which it is sent. An | ||
| authorization server MAY be identified by either its issuer identifier | ||
| or its token endpoint URL. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This weakens the requirement that the authorization server be identified as the audience of the token.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The text just above is still there https://github.com/oauth-wg/draft-ietf-oauth-rfc7523bis/pull/18/files#diff-f8b056b1a56bc0092e4789b332d277014a437a10e97bfc70483936f5734187caR246
The JWT MUST contain an <spanx style="verb">aud</spanx> (audience) claim containing a value that identifies the authorization server as the intended audience. Two cases are differentiated:
selfissued
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I disagree with deleting "The audience value MUST identify the authorization server as the intended audience." This seems like a regression.
I also disagree with deleting the SAML example, since it is useful to readers.
I'm torn on doing anything to the SAML grant beyond just saying it SHOULD NOT be used. The least of which is updating non-normative and difficult to parse examples. |
To fix #13
Advise the client to ensure that the audience of an assertion authorization grant (AAG) makes sense with respect to where it’s being sent.
See it rendered here https://drafts.oauth.net/draft-ietf-oauth-rfc7523bis/13-client-responsible/draft-ietf-oauth-rfc7523bis.html