Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Risk of issuer monitoring with jwt-vc-issuer metadata #293

Open
cre8 opened this issue Jan 2, 2025 · 0 comments
Open

Risk of issuer monitoring with jwt-vc-issuer metadata #293

cre8 opened this issue Jan 2, 2025 · 0 comments

Comments

@cre8
Copy link

cre8 commented Jan 2, 2025

In case the the credential includes a link to the hosted metadata, the relying party will fetch it like:

GET /.well-known/jwt-vc-issuer HTTP/1.1
Host: example.com

A malicious issuer could add unique subdomains to add a tracker, e.g. the jti value or another internal identifier <jti>.exmaple.com/.well-known/jwt-vc-issuer. This can not be detected by the relying party since the url of the jwks_uri must not match with the same host as the vct value (or the issuer uses an x509 that must also not be bound to a domain, or maybe it's a wildcard one).

Suggestion:
Add a privacy consideration note that this can be used for presentation tracking. An alternative suggestion would be to allow the Wallet to include the vct issuer metadata into the e.g. presentation response when using OID4VP. In this case the issuer may only know that the wallet is presenting a credential, when the VCT it was not cached before (in case an integrity value was provided, the wallet can be sure it never has an outdated version of the vct values).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant