Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Bad" use of Subject Identifiers #16

Closed
yaronf opened this issue Nov 1, 2020 · 1 comment
Closed

"Bad" use of Subject Identifiers #16

yaronf opened this issue Nov 1, 2020 · 1 comment

Comments

@yaronf
Copy link
Contributor

yaronf commented Nov 1, 2020

Yaron: "Subject identifiers requested by the RC serve only to identify the RO in the context of the AS and can't be used as communication channels by the RC" - this sounds a bit naive, people will do that anyway. So why is this a useful statement? (And similarly in 3.4)

Justin: This inclusion is based roughly off of a similar constraint in OIDC around subject identifiers: https://openid.net/specs/openid-connect-core-1_0.html#ClaimStability

I agree that people will do dumb things anyway, but that’s why we need to spell out why it’s dumb here.

Yaron: I haven't looked at the OpenID text, but at least here, we do not explain why using the email address to send email is a bad idea, we just say that it is. I think we should give a rationale.

@fimbault
Copy link
Collaborator

fimbault commented Feb 16, 2021

There are many reasons why we don't want emails ("should not use email").

  1. No assurance it's unique (ex: admin@example.com)
  2. No idea on email policy (could be transfered to someone else)
  3. Ties to a delivery method (which shouldn't be our goal here)

Also not using email facilitates the distinction with what OIDC/authentication mechanisms provide (more an internal argument for the specification text itself).

Might also want to push forward privacy enhancing mechanisms.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants