-
Notifications
You must be signed in to change notification settings - Fork 24
chore(auth): DPoP and public fixes #651
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
ad796d2 to
c2456f7
Compare
mkleene
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we gain anything by only allowing some hosts? This seems to make sure that the token is for us. I'd say that the aud parameter is what we want here and this is just another thing that we need to configure.
There might be something that I'm missing about what this buys us, though.
|
RFC 9449 seems to indicate we should do a full match of the URI, after 'normalization' and removing any fragment or query. The code currently only does a match of the path. A compliant DPoP client will set the HTU to exactly this value, although we should still do normalization of it after receiving it. https://www.rfc-editor.org/rfc/rfc9449.html#name-checking-dpop-proofs Anyway I see two solutions:
I'll look into 2 |
- expose legacy public key endpoint as public - DPoP `htu` should include origin part of url - clarify error messages for dpop
removes allowedHosts parameter, isntead use origin header in request
6867898 to
9ab0a62
Compare
|
Now it checks the |
mkleene
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks great!




htushould include origin part of url