-
Notifications
You must be signed in to change notification settings - Fork 17
Open
Description
A suggestion brought forward by @thibmeu at yesterday's call is to adopt the JOSE framework and in particular (as I understand it) the JWS format from RFC 7515 to expose the public key(s) to be used to validate httpsig-signed messages.
Indeed, I see the typical practice is to expose a https://ocm-server.org/.well-known/jwks.json file that would have a format such as:
{
"keys": [
{
"kty": "<key type, e.g. RSA>",
"use": "sig",
"kid": "key-identifier-2025-12",
"alg": "RS256",
"n": "...",
"e": "...",
}
]
}
(or similar for an EC key)
For OCM, this would mean:
- Entirely dropping the pubkey/pubkeys fields in the OCM discovery endpoint.
- Stating that the capability
http-sigand correspondingrequest-http-signaturecriteria entail exposing/discovering the signing key from the above endpoint.
We could also consider to introduce amust-use-http-sigrequirement, rather than having the criteria.
@mickenordin you've most recently implemented signatures in your "toy" system, what do you think?
Metadata
Metadata
Assignees
Labels
No labels