Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document issues when relying on HTTP Origin header #17

Open
elf-pavlik opened this issue Jun 27, 2024 · 1 comment
Open

Document issues when relying on HTTP Origin header #17

elf-pavlik opened this issue Jun 27, 2024 · 1 comment
Assignees

Comments

@elf-pavlik
Copy link
Member

Original issue from 2018 solid/web-access-control-spec#34

TL;DR

If the client is a server-side application, it can easily set any origin it wants in the HTTP header. WAC has acl:origin used for access control; if it relies on an HTTP header, it can be very easily circumvented. The same applies to the trusted apps experiment if the server relies on the HTTP origin header.

An alternative relies on client identifiers; for example, Solid-OIDC sets an app claim in the issued ID Token. This doesn't work with dynamic client registration since client identifiers are ephemeral. ACP has acp:client matcher, and a similar proposal exists for WAC solid/web-access-control-spec#81

@michielbdejong
Copy link

See also solid/webid-oidc-spec#12

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants