Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deprecate query string authorization for /_matrix/federation/v1/openid/userinfo #1902

Open
Johennes opened this issue Jul 5, 2024 · 2 comments
Labels
improvement An idea/future MSC for the spec

Comments

@Johennes
Copy link
Contributor

Johennes commented Jul 5, 2024

Suggestion

The GET /_matrix/federation/v1/openid/userinfo endpoint currently takes the access token as a query parameter. This is contrary to OIDC's own definition of /userinfo which uses the Authorization header to submit the token. It's also somewhat contrary to MSC4126 where query string authorization was removed from the CS and IS APIs.

Unless there are reasons against it, I think we should introduce header authorization and deprecate query string authorization on this endpoint, too.

@Johennes Johennes added the improvement An idea/future MSC for the spec label Jul 5, 2024
@turt2live
Copy link
Member

As a federation endpoint, there will be other Authorization headers. I'm not sure if these would cause conflict.

@Johennes
Copy link
Contributor Author

Johennes commented Jul 8, 2024

Hm, yeah you're right:

Authorization: X-Matrix origin="origin.hs.example.com",destination="destination.hs.example.com",key="ed25519:key1",sig="ABCDEF..."

So I guess the best we could do is append the token to the custom X-Matrix scheme with a dedicated key. Not sure if that would make things better or worse. 🤔

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
improvement An idea/future MSC for the spec
Projects
None yet
Development

No branches or pull requests

2 participants