On Wed, May 01, 2019 at 11:32:40PM -0700, Paul Querna wrote:
> Hi all,
> HTTP Request Signing
> >   o  "http_method": The HTTP method for the request to which the JWT is
> >      attached, in upper case ASCII characters, as defined in [RFC7231]
> >      (REQUIRED).
> >
> >   o  "http_uri": The HTTP URI used for the request, without query and
> >      fragment parts (REQUIRED).
> 
> HTTP Request signing may be a quagmire that this spec wishes to avoid,
> but it seems very hard to avoid "fixing" it for at-scale adoption.
> With the Okta-hat on, I think this is one area we would like to see
> some iteration on.  I think it would be ideal to not require multiple
> client sign() and server validate() PKI operations per request, so
> this is where combining DPoP-Proof and a Request Signature start
> making sense to me.
> 
> Keeping it simple, there are two approaches for DPoP for adding
> attesting about the HTTP Request:
> 
>   a) Adding parts of the HTTP Request as claims
>   b) Adding a hash of an HTTP Request as a claim
> 
> For option (b), it seems like part of this could live in a separate spec:
>  1) request canonicalization
>  2) request hashing
> 
> <https://tools.ietf.org/html/draft-cavage-http-signatures-11> does
> cover request canonicalization, but the hashing is part of the
> specific signature scheme.  From an implementors POV, layering
> draft-cavage-http-signatures-11 in addition to DPoP is annoying since
> it would take two sign or verify key operations per request.

I haven't had a chance to read the linked draft, but we've also seen some
activity recently around
https://tools.ietf.org/html/draft-rundgren-json-canonicalization-scheme-05
and linked/related drafts, which are also working in a similar space.

-Ben

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to