-
Notifications
You must be signed in to change notification settings - Fork 99
Description
The spec describes a fingerprinting attack in 7.3.1. It says:
Our mitigation to this problem is to use the § 3.1 The Well-Known File file. The existence of a file at the root of the IDP’s domain is enforced to ensure that the file name does not introduce fingerprints about the RP being visited.
The whole manifest could be in this location, but instead it only points to the real manifest from there. This allows the flexibility in the future to allow a small constant number of manifests, should an IDP require this in the future, instead of just a single one.
This commentary makes sense to me. However, the "Fetch the config file" algorithm does not actually do this. This algorithm allows a config to be valid in the "Check accounts and login url step" if the accounts and login url match those urls that appear in the well known file. The tracking domain can trivially return an unbound number of manifest files that have the same accounts and login urls.