Tim,

>> Start at https://accounts.google.com/.well-known/openid-configuration

>>

>> Hope it works...


> Looks good.  I added this to the interop info at  
> http://osis.idcommons.net/wiki/OC5:Google_Deployment.


Actually it look bad.
That configuration includes

"jwks_uri": "https://www.googleapis.com/oauth2/v2/certs";,
That JWK has two key. Calling raw keys “certs” is a curious choice.
Both keys are wrong.
They are 1024-bit RSA keys. The JWA spec says they MUST be 2048-bit or larger.
The "n" members (modulus) are base64-encoded, when they should be 
base64url-encoded. Note the presence of / and +.
They also start (after base64-decoding) with a leading 0x00 byte, whereas the 
spec says "n" is unsigned and “MUST utilize the minimum number of octets to 
represent the value”. There should be 1024/6=171 b64 chars, instead of 
(8+1024)/6=172.
http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-23#section-6.3.1.1


https://www.googleapis.com/oauth2/v2/certs:

{

 "keys": [

  {

   "kty": "RSA",

   "alg": "RS256",

   "use": "sig",

   "kid": "36239103c08ce207082b721dfbc80bc8d800bff2",

   "n": 
"AKunY03zz/oJonovVNJjnjscjScnqtdtMEmnExJShJkoh8KjyHtH+TAldA7jrpQHDJnX81IxbkmH1JQMkgSKN4qVvJTqvA9RQFc6phN+7HU4JfPfpkYb3Jbnl35w4CXJkZoyXucAj4qw87szAgt2WBLrFoT08PjONmii5cmFR6BT",

   "e": "AQAB"

  },

  {

   "kty": "RSA",

   "alg": "RS256",

   "use": "sig",

   "kid": "7e18e2970941338884c88f2e789d7d8c519cd919",

   "n": 
"ALjEqP0OUMivrQUIPj39+ckmE3KBtDDNdJZLCxFRGT2gUETsbc/x+zUit5xvKWN4DbSlVCwHdvIQcEgTdG+HZTrCoPDkoiOW+DxX4j+IkpiS1hy3YL9gHbBD4J75dGGRTfavZ77fu4E0/a/3s22rOda21ZQlUhlUZtyUxUGpxxSj",

   "e": "AQAB"

  }

 ]

}


--
James Manger

_______________________________________________
security mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-security

Reply via email to