Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Santuario / Jakarta move → looks like 2.1 may be sunsetting pretty quickly, trying to get confirmation on a date

  2. OIDC / OAuth coordination

    1. Inc. OP package name transfer to oidc-common for profile config. Which versions and when.

    2. Features in the OP which requires the metadata resolver work in odic-common

  3. (RDW) M2 verification is now on for IdP nightly build. Still outstanding (before we discuss other attacks)

    1. Process for accepting new certs - we have such a case outstanding for net.minidev:json-smart:2.4.7

    2. A plan for what to do if we do discover a forgery.

Attendees:

Brent

Daniel

Henri

Ian

John

Marvin

Phil

  • Jira Legacy
    serverSystem JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverIdf52c7d31-6eab-3f0e-93c3-231b5754d506
    keyJPAR-178
    https://shibboleth.atlassian.net/browse/JPAR-178 updated this. Seems OK - at least for now.

  • Working on RP:

    • Profile configuration hookup (OIDC.SSO for now)

    • Message Encoders. Proposed Propose to borrow the ideas used in the SpringAwareMessageEncoderFactory but for OAuth ResponseModes and RP authn request. In

      Jira Legacy
      serverSystem JIRA
      columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
      serverIdf52c7d31-6eab-3f0e-93c3-231b5754d506
      keyJCOMOIDC-27

    Work on commons:

  • Work on commons:

  • Other:

    • Maybe look to switch the default CSRF validation predicate to use a constant-time algorithm. Although the predicate is injectable and I am not sure adds much in our case.

Rod

...

  • SP 3.3

    • Would be nice to figure out if it’s “safe” to build these on an M1 Mac at some point.

    • Package signing was an issue, ended up tunnelling GPG up to the server after uploading

      • Maybe look at doing the signing from within the Docker images somehow? Probably pretty hard to pull off.

    • Already one minor bug in the deprecation logging, waiting for more bugs before I release a patch.

  • Started reviewing code for OAuth client_credentials grant and JWT token work

    • General comment: there’s a ton of very complex machinery and token bloat built around the “avoid resolving some attributes on the backchannel” issue. We never even bothered to deal with this in SAML and it was never that big a concern that I’m aware of…was this a big enough concern to warrant all that effort and technical debt? Maybe moot I guess.

Tom

Other