-
Notifications
You must be signed in to change notification settings - Fork 5
[Security Consideration] Qualitative analysis and containment of http connections to third parties #71
Comments
Also related to this |
Here we would find the answer about a cached approach |
I think that Trust Mark could mitigate this kind of problem, especially if it could be included in the authorization request ... |
Here a value proposition for Trust Marks A RP sent an automatic client registration to an OP through a authz request with a TrustMark. If the trust mark is not valid the metadata discovery won't happen and the request is rejected. Let's suppose that an OP have been just onboarded in a federation and it's not aware of any other intermediates. Question |
The more I think about Trust marks in the authorization request the less I like the idea. |
what about using a JWE private_key_jwt the problem would be where to resolve that kid to public key to be used for decription. this must be done only the first time, any other next request of the RP would be validated by OP by its own, having the trust chain for that RP loaded in. anyway this method tell us that the TM is quite useless for security considerations, if any other idea wouldn't come in place |
Since TM was not designed to add security except secondarily by increasing the trust I'm not surprised. |
Let's assume that Alice wants to trigger a DDoS to Bob (victim website).
Alice issues a series of automatic client registration request to as many as possible OP in a multilateral federation, pretending to be bob (in request jwt, as iss). The trust chain procedure will made many HTTP requests to bob.
Security remediations that can be mentioned:
This kind of attack could affects any other kind of OAuth2/OIDC validation procedure that handle foreign connection, for example, to validate jwks and x5c
What else?
The text was updated successfully, but these errors were encountered: