Skip to content

Commit

Permalink
fix: renamed jwt issuer metadata to jwt vc issuer metadata in securit…
Browse files Browse the repository at this point in the history
…y considerations
  • Loading branch information
Oliver Terbu authored and Oliver Terbu committed Nov 27, 2023
1 parent 9184865 commit e0e71cc
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions draft-ietf-oauth-sd-jwt-vc.md
Original file line number Diff line number Diff line change
Expand Up @@ -488,12 +488,12 @@ account when using SD-JWT VCs:

## Server-Side Request Forgery

The JWT Issuer Metadata configuration is retrieved from the JWT Issuer by the
The JWT VC Issuer Metadata configuration is retrieved from the JWT VC Issuer by the
Holder or Verifier. Similar to other metadata endpoints, the URL for the
retrieval MUST be considered an untrusted value and could be a vector for
Server-Side Request Forgery (SSRF) attacks.

Before making a request to the JWT Issuer Metadata endpoint, the Holder or
Before making a request to the JWT VC Issuer Metadata endpoint, the Holder or
Verifier MUST validate the URL to ensure that it is a valid HTTPS URL and that
it does not point to internal resources. This requires, in particular, ensuring
that the host part of the URL does not address an internal service (by IP
Expand All @@ -503,7 +503,7 @@ resolved DNS name does not point to an internal IPv4 or IPv6 address.
When retrieving the metadata, the Holder or Verifier MUST ensure that the
request is made in a time-bound and size-bound manner to prevent denial of
service attacks. The Holder or Verifier MUST also ensure that the response is a
valid JWT Issuer Metadata configuration document before processing it.
valid JWT VC Issuer Metadata configuration document before processing it.

Additional considerations can be found in [@OWASP_SSRF].

Expand Down

0 comments on commit e0e71cc

Please sign in to comment.