-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: issuance PAR req jti #54
Conversation
I forgot to add the JWS claims in the PAR request. However, the Nonce will provide the exact reply detection mechanism to avoid the PAR replay. In any case, we can have the "jti" as well as it is a good practice for the JWS. Probably, we can add the following missing headers of the JWS: "iss", "aud", "exp", and "iat". |
|
So, as the PAR request is created and signed by the Wallet Instance, in this case, the Wallet Instance itself can add the |
@asharif1990 are you suggesting to use |
Sorry I was wrong about that, I meant to say use |
I think |
I am totally okay with |
following a chat with @fmarino-ipzs we agreed that we should investigate better what would be the impacts of a reply of that request in this pr we have proposed there's the perception that we don't have any relevant risk due to a reply of that request, further analysis are required |
Here my considerations
This makes to me that jti aside with its issuer Is collision resistant and prevents that the request might be replayed While the nonce is required when a request or any Response May be replayed, in particular when the transation is async and over different endpoints |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
the PAR request is a JWS which its reuse (replay attack) must be prevented
This PR adds
jti
in the PAR request JWS