-
Notifications
You must be signed in to change notification settings - Fork 303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Incorrect iss
value on tokens, not the same as issuer
value in OpenID configuration
#1609
Comments
https://openid.net/specs/openid-connect-core-1_0.html#IssuerIdentifier reads:
However, https://solidcommunity.net/.well-known/openid-configuration returns
so it is an NSS bug that it mints tokens with a different issuer. |
iss
value on tokens, not the same as issuer
value in OpenID configuration
@jaxoncreed are you ok with the fact that it is a NSS bug. |
Yeah, if there is no trailing slash in the openid-configuration, there shouldn't be one in the token. |
EDIT: this was a bad idea because it caused #1613 so undid this now. |
@michielbdejong So in fact you did not remove trailing slash to issuer but added a trailing slash.
|
EDIT: fixed now, the server is back to how it was before last night |
I'm now trying out a less invasive work-around, namely hard-coding the issuer in ./node_modules/@solid/oidc-op/src/handlers/OpenIDConfigurationRequest.js |
I tried out various things but it also ties in with the issuer linked to from the webid profile, and apparently CSS isn't successfully extracting the issuer from the DPop token that the WAC tests send, so in the end I gave up trying to fix this situation and just commented out https://github.com/solid/access-token-verifier/blob/3f99fb7/src/algorithm/verifySolidAccessTokenIssuer.ts#L17 in my system-under-test. This issue still needs fixing though. |
Well, the token is there and CSS spells it out, so that can't really be the issue. The issue is a bug in the test suite where https://solidtestsuite.solidcommunity.net/profile/card#me uses This means that he test suite is actually testing whether NSS behaves incorrectly, and confirms that it's not a good idea to base a test suite on it. |
In related news, why is https://github.com/solid/web-access-control-tests/blob/main/run-against-css.sh publicly listing actual username/password combinations? Separately from the dozens of bad reasons I can think of, it basically means that anyone can break the test suite at any time. As tempted as I felt to fix the slash in https://solidtestsuite.solidcommunity.net/profile/card#me, the fact that I can does not seem good. |
When trying to log in to CSS using the
run-against-css.sh
script of the WAC tests, you get:2021-08-11T12:45:33.820Z [DPoPWebIdExtractor] warn: Error verifying WebID via DPoP-bound access token: The access token issuer doesn't match its associated WebID's trusted OIDC issuers. Actual: https://solidcommunity.net/ Expected: https://solidcommunity.net
So maybe we can change NSS to remove that trailing slash from the issuer?
The text was updated successfully, but these errors were encountered: