Skip to content

Commit 11f1b2c

Browse files
authored
Merge pull request #141 from oauth-wg/130-allow-mac-as-signature-algorithms
remove restrictions to not allow MAC-based algorithms
2 parents 2a579ff + ec1e9af commit 11f1b2c

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ The following additional rules apply:
189189

190190
1. The JWT MAY contain other claims. All claims that are not understood by implementations MUST be ignored.
191191

192-
2. The JWT MUST be digitally signed using an asymmetric cryptographic algorithm. The authorization server MUST reject the JWT if it is using a Message Authentication Code (MAC) based algorithm. The authorization server MUST reject JWTs with an invalid signature.
192+
2. The JWT MUST be digitally signed or integrity protected with a Message Authentication Code (MAC). The authorization server MUST reject JWTs if signature or integrity protection validation fails.
193193

194194
3. The authorization server MUST reject a JWT that is not valid in all other respects per "JSON Web Token (JWT)" {{RFC7519}}.
195195

@@ -240,7 +240,7 @@ The following additional rules apply:
240240

241241
1. The JWT MAY contain other claims. All claims that are not understood by implementations MUST be ignored.
242242

243-
2. The JWT MUST be digitally signed using an asymmetric cryptographic algorithm. The authorization server MUST reject the JWT if it is using a Message Authentication Code (MAC) based algorithm. The authorization server MUST reject JWTs with an invalid signature.
243+
2. The JWT MUST be digitally signed using an asymmetric cryptographic algorithm. The authorization server MUST reject JWTs with an invalid signature.
244244

245245
3. The public key used to verify the JWT MUST be the key located in the "cnf" claim of the corresponding Client Attestation JWT.
246246

@@ -513,7 +513,7 @@ Upon receiving a Client Attestation, the receiving server MUST ensure the follow
513513

514514
2. The Client Attestation JWT contains all claims and header parameters as per [](#client-attestation-jwt).
515515
3. The Client Attestation PoP JWT contains all claims and header parameters as per [](#client-attestation-pop-jwt).
516-
4. The alg JOSE Header Parameter for both JWTs indicates a registered asymmetric digital signature algorithm {{IANA.JOSE.ALGS}}, is not none, is not MAC based, is supported by the application, and is acceptable per local policy.
516+
4. The alg JOSE Header Parameter for both JWTs indicates a registered asymmetric digital signature algorithm {{IANA.JOSE.ALGS}}, is not none, is supported by the application, and is acceptable per local policy.
517517
5. The signature of the Client Attestation JWT verifies with the public key of a known and trusted Attester.
518518
6. The key contained in the `cnf` claim of the Client Attestation JWT is not a private key.
519519
7. The signature of the Client Attestation PoP JWT verifies with the public key contained in the `cnf` claim of the Client Attestation JWT.
@@ -645,6 +645,7 @@ This section requests registration of the following scheme in the "Hypertext Tra
645645

646646
-07
647647

648+
* remove restrictions to not allow MAC-based algorithms
648649
* require `iat` in Client Attestation PoP JWT
649650
* clarify `use_attestation_challenge` and add `invalid_client_attestation`
650651
* clarify refresh token binding

0 commit comments

Comments
 (0)