Closed michielbdejong closed 3 years ago
The jwk.alg
field is incorrect. If present, the value should be one of those listed by IANA: https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms
In this case, the alg field should be RS256
Turns out NSS behaviour was fine, and it was solid-auth-fetcher that was setting the wrong value!
The following DPoP token is not accepted by https://github.com/solid/identity-token-verifier:
Note that both
header.jwk.kty
andheader.jwk.alg
have the value 'RSA'. It makes community-server output a validation error which is thrown in https://github.com/solid/identity-token-verifier/blob/0cbb50406717496ecc900d1e3171b2f7ee946a31/src/guards/DPoPJWKGuard.ts#L65 It checks ifRSA
is inSet { 'RS256', 'RS384', 'RS512' }
, which it is not.And indeed, if you change
header.jwk.alg
to 'RS256', then community-server correctly logs: