Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

why isn't cnf the only way to bind to a holder public key? #419

Open
bc-pi opened this issue Mar 20, 2024 · 4 comments
Open

why isn't cnf the only way to bind to a holder public key? #419

bc-pi opened this issue Mar 20, 2024 · 4 comments

Comments

@bc-pi
Copy link
Collaborator

bc-pi commented Mar 20, 2024

Right after the IETF 119 OAuth session yesterday in a talk with @selfissued and @ve7jtb that started with discussion of PR #394, the question again came up (with some surprise on their part) as to why the cnf claim isn't the one and only way specified to put the holder's public key in the issuer-signed JWT. I honestly had a hard time giving a good rational for SD-JWT not being more prescriptive with it's requirements here.

It seems that using the cnf claim exclusively would be more straightforward and much better for interop.

@bifurcation has previously made similar comments, "it seems like there's an unnecessary level of ambiguity around how the Issuer-signed JWT binds to a holder public key. Can we not just say cnf? Why do we need more? This point actually worries me more than [others] -- without clarity on this, there is no hope of writing stacks that interop."

Using the cnf claim exclusively could also help with some clarity in the security considerations where there currently has to be wording like "[if there's] no recognized Key Binding data is present in the SD-JWT..." and " ... the Issuer might have added the key to the SD-JWT in a format/claim that is not recognized by the Verifier.".

Note this is related to but separate from the question of if the presence of a cnf claim in the issuer-signed JWT means that the verifier should have to require a KB-JWT. The cnf claim can be made the way to do holder binding while still leaving that up to verifier policy.

@selfissued
Copy link
Collaborator

I support defining cnf as the way to do holder binding.

I'll note that cnf is extensible via a registry, so should the existing cnf parameters not work for a use case, a new one can be defined and used.

@bifurcation
Copy link

Yep, this sounds good to me.

@bc-pi bc-pi changed the title why can't cnf be the only way to bind to a holder public key? why isn't cnf the only way to bind to a holder public key? Mar 21, 2024
@babisRoutis
Copy link
Contributor

It seems that using the cnf claim exclusively would be more straightforward and much better for interop.

👍

@bc-pi
Copy link
Collaborator Author

bc-pi commented May 15, 2024

maybe leaving the door open to something like cnfs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants