Hi Mike,

here are my review comments:

section 2

PPID and openid2_realm:
"If PPID was used to obtain the OpenID 2.0 Identifier" - How is the RP supposed to know/find out whether the OP issued a PPID or a universal/global OpenID? I would rather suggest to make this a mandatory parameter, the RP must know its OpenID 2.0 realm anyway.

"If the value of openid2_id is an XRI [XRI_Syntax_2.0], the mechanism for verifying the iss in the ID Token is still TBD" - Do you want to determine this before the spec is published? If not I would suggest to replace the TBD by "... is out of scope for this specification."

"There could be an attack by a malicious RP to obtain the user’s PPID for another RP to perform identity correlation. To mitigate the risk, the OP MUST verify that the realm and RP’s Redirect URI matches as per Section 9.2 of OpenID 2.0 [OpenID.2.0]."

section 3

I'm not sure what this means. Does it mean the RP's XRDS document must contain the RP’s Redirect URI (a OAuth/OIDC redirect_uri)? If so, is the RP supposed to use a certain service Type or "http://specs.openid.net/auth/2.0/return_to";?

Example:
<Service xmlns="xri://$xrd*($v*2.0)">
<Type>http://specs.openid.net/auth/2.0/return_to</Type>
  <URI>http://consumer.example.com/return</URI>
</Service>

section 4.1.2

"If a corresponding OpenID 2.0 Identifier is not found for the authenticated user, the openid2_id claim in the ID Token MUST have the value NOT FOUND." I assume the value must be "NOT FOUND"?

section 6

step 2
"... The server SHOULD return a JSON with iss ..." Why not MUST? Otherwise the RP cannot verify whether the OP OP is Authoritative.

step 3
"If the openid2_id does not start with http or https, it is an XRI [XRI_Syntax_2.0]. In this case, the RP needs to construct the verification URI by concatenating https://xri.net/, the value of the openid2_id claim, and /(+openid_iss). Requesting the resulting URI with GET will result in a series of HTTP 302 redirects. The RP MUST follow the redirects until HTTP status code 200 OK comes back. The URI that resulted in 200 OK is the authoritative issuer for the XRI. This URI MUST exactly match the iss in the ID Token except for the potential trailing slash (/) character."

Doesn't this contradict the note regarding XRI in section 2 (TBD)?

section 8.1

"This standard allows the RP to verify the authenticity of the OpenID 2.0 Identifier through ID Token even after the OpenID 2.0 OP is taken down. To enable this, the OP MUST publish the public keys that were used to sign the ID Token with openid2_id claim at the URI that this OpenID 2.0 Identifier points to."

Where is the relation between the openid2 identifier and the OP's public keys? Public keys are nowhere else mentioned in this spec.

best regards,
Torsten.

Am 17.09.2014 03:10, schrieb Mike Jones:

The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:

·OpenID 2.0 to OpenID Connect Migration 1.0 <http://openid.net/specs/openid-connect-migration-1_0-06.html> – Defines how to migrate from OpenID 2.0 to OpenID Connect

An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45 day public review period for the specification drafts in accordance with the OpenID Foundation IPR policies and procedures. This review period will end on Friday, October 31, 2014. Unless issues are identified during the review that the working group believes must be addressed by revising the drafts, this review period will be followed by a seven day voting period during which OpenID Foundation members will vote on whether to approve these drafts as OpenID Implementer’s Drafts. For the convenience of members, voting may begin up to two weeks before October 31^st , with the voting period still ending on Friday, November 7, 2014.

This specification is available at:

·http://openid.net/specs/openid-connect-migration-1_0-06.html

A description of OpenID Connect can be found at http://openid.net/connect/ <http://openid.net/connect/>. The working group page is http://openid.net/wg/connect/ <http://openid.net/wg/connect/>. Information on joining the OpenID Foundation can be found at https://openid.net/foundation/members/registration. If you’re not a current OpenID Foundation member, please consider joining to participate in the approval vote.

You can send feedback on the specifications in a way that enables the working group to act upon your feedback by (1) signing the contribution agreement at http://openid.net/intellectual-property/ to join the working group (please specify that you are joining the “AB+Connect” working group on your contribution agreement), (2) joining the working group mailing list at http://lists.openid.net/mailman/listinfo/openid-specs-ab, and (3) sending your feedback to the list.

-- Michael B. Jones – OpenID Foundation Board Secretary

(This notice has also been posted at http://openid.net/2014/09/16/review-of-proposed-implementers-draft-of-openid-2-0-to-openid-connect-migration-specification/.)



_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to