-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add algorithm hs2019 to createAuthzHeader. #10
base: main
Are you sure you want to change the base?
Conversation
Great @aljones15, thank you! I expect that we may also need to sign over the canonicalization value of "(canonicalization-algorithm) hs2019" -- but that's for later... we'll have to push that through the IETF HTTP WG. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The algorithm is unprotected, which probably needs to be fixed in a future PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm... on second thought, why is this not going in the base http-signature library? That's where this belongs, right?
/cc @dlongley @davidlehn -- does "hs2019" go in the base http-signatures library?
@msporny I can't seem to find a latest version of the spec that makes algorithm required. The latest one I could find is the one that expires Oct 12 2020 and in that spec algorithm is recommended (it was required in a 2014 spec). Is there a newer spec I need to look at? |
ok so sorry to harp on this one, but:
https://tools.ietf.org/html/draft-ietf-httpbis-message-signatures-00#section-4.1 so it says it is RECOMMENDED, but has a default value? |
@aljones15 yes, the spec is not super helpful here... https://tools.ietf.org/html/draft-ietf-httpbis-message-signatures-00#section-5.1.2 recommended support for I would interpret the spec as follows: use |
that's basically how the binary works: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Accepting this because the createAuthzHeader
used here is a helper function that does not do anything with the algorithm used. This allows other algorithms to be used in combination with different canonicalization mechanisms -- but this lib uses the only one provided by the underlying library at the moment -- and so hs2019
matches that usage.
@aljones15 Please address merge conflicts and add a changelog entry at your convenience. |
@mattcollier this was intended to be part of the implementation of version 13 of the http sigs spec. However I guess this can be added as we are using |
dc05a12
to
c229e11
Compare
Adds
hs2019
to the authz headers:this also ensures the tests are using the latest
http-signature-zcap-verify
Tests:
edv-client
with no errors so far.This corrects an error @msporny found here: https://github.com/decentralized-identity/secure-data-store/issues/113