Skip to content

Manifest fingerprinting wording describes mitigation imprecisely #777

@will-bartlett

Description

@will-bartlett

The spec describes a fingerprinting attack in 7.3.1. It says:

Our mitigation to this problem is to use the § 3.1 The Well-Known File file. The existence of a file at the root of the IDP’s domain is enforced to ensure that the file name does not introduce fingerprints about the RP being visited.

The whole manifest could be in this location, but instead it only points to the real manifest from there. This allows the flexibility in the future to allow a small constant number of manifests, should an IDP require this in the future, instead of just a single one.

This commentary makes sense to me. However, the "Fetch the config file" algorithm does not actually do this. This algorithm allows a config to be valid in the "Check accounts and login url step" if the accounts and login url match those urls that appear in the well known file. The tracking domain can trivially return an unbound number of manifest files that have the same accounts and login urls.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions