Closed cryptphil closed 7 months ago
I think you are correct.
To complicate things, the 200 Response to this may again include a redirect_uri
see: https://openid.github.io/OpenID4VP/openid-4-verifiable-presentations-wg-draft.html#section-6.2-18.2
I think you are correct. To complicate things, the 200 Response to this may again include a
redirect_uri
see: https://openid.github.io/OpenID4VP/openid-4-verifiable-presentations-wg-draft.html#section-6.2-18.2
Stumbled over this today as well - is my understanding correct that this is necessary to prevent the session fixation attack described in 12.2. If so should we add this as a recommended/required step in this profile (mandating a redirect_uri as a response to the direct_post flow)?
If we mandate redirect, we mandate the same device flow, correct? So I'm unsure
OID4VP currently does not limit the usage of redirects after direct_post to only same-device flows. even though the security benefit that this redirect gives for the same-device does not apply for cross-device flows. before we make any clarifications on this topic in HAIP, we should probably make it clearer in oid4vp itself. here is the issue :) https://github.com/openid/OpenID4VP/issues/25
The HAIP specifies in Section 5 for OpenID4VP that:
However,
redirect_uri
must not be present when the Response Mode isdirect_post
as described in the OpenID4VP specs in Section 6.2-7.2:Therefore, I assume that the HAIP should use
response_uri
instead ofredirect_uri
which would align with the OpenID4VP specs.