Re: [OAUTH-WG] Signed JWK Sets

2024-04-11 Thread Neil Madden
> On 12 Apr 2024, at 03:16, Ethan Heilman wrote: > >  > Hi Neil, > > I agree that PIKA would not protect against an attacker compromising a JWKS > URI via a mis-issued TLS cert. > > I was thinking of a simpler attack where the attacker compromises the server > where a JWKS URI is hosted or

[OAUTH-WG] (no subject)

2024-04-11 Thread Rebecca Warren
Sent from Yahoo Mail for iPhone ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Signed JWK Sets

2024-04-11 Thread Joseph Salowey
The mechanism in the draft provides some separation between the trust establishment and distribution which is useful. This is definitely applicable to the use cases described in the draft and I agree with Ethan that it can help in other areas as well depending upon how things are deployed. I supp

Re: [OAUTH-WG] Signed JWK Sets

2024-04-11 Thread Ethan Heilman
Hi Neil, I agree that PIKA would not protect against an attacker compromising a JWKS URI via a mis-issued TLS cert. I was thinking of a simpler attack where the attacker compromises the server where a JWKS URI is hosted or the JWKS is stored. For instance consider an JWKS which is read from a dat

Re: [OAUTH-WG] Signed JWK Sets

2024-04-11 Thread Neil Madden
On 11 Apr 2024, at 01:12, Ethan Heilman wrote: > > I want to voice my support for this draft: Proof of Issuer Key Authority > (PIKA). The ability to reason about the past validity of JWKS is extremely > useful for using OIDC in signing CI artifacts and e2e encrypted > messaging.This includes w