Skip to content

Commit f13bc95

Browse files
authored
mnr editorial changes (#328)
* mnr editorial change * Update draft-ietf-oauth-sd-jwt-vc.md * Update draft-ietf-oauth-sd-jwt-vc.md * Update draft-ietf-oauth-sd-jwt-vc.md * Update draft-ietf-oauth-sd-jwt-vc.md * Add myself to the acknowledgements section.
1 parent dd0601c commit f13bc95

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

draft-ietf-oauth-sd-jwt-vc.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,7 @@ If the `iss` value contains a path component, any terminating `/` MUST be
417417
removed before inserting `/.well-known/` and the well-known URI suffix
418418
between the host component and the path component.
419419

420-
The following is a non-normative example of a HTTP request for the JWT VC Issuer
420+
The following is a non-normative example of an HTTP request for the JWT VC Issuer
421421
Metadata configuration when `iss` is set to `https://example.com/tenant/1234`:
422422

423423
```
@@ -1104,7 +1104,7 @@ described in (#privacy-preserving-retrieval-of-type-metadata).
11041104

11051105
Some claims in the SD-JWT VC and properties in the Type Metadata, e.g., `display`, allows issuers and providers of metadata to
11061106
specify human-readable information. These can contain arbitrary textual information that
1107-
may be displayed to developers. As such, any consuming application MUST ensure that maliciously
1107+
may be displayed to end users and developers. As such, any consuming application MUST ensure that maliciously
11081108
crafted information cannot be used to compromise the security of the application
11091109
or the privacy of the user. To this end, the following considerations apply:
11101110

@@ -1150,13 +1150,13 @@ to phone home to the Issuer.
11501150

11511151
For example, a malicious Issuer could generate a unique value for the Issuer identifier
11521152
per Holder, e.g., `https://example.com/issuer/holder-1234` and host the JWT VC Issuer Metadata.
1153-
The Verifier would create a HTTPS GET request to the Holder-specific well-known URI
1153+
The Verifier would create an HTTP GET request to the Holder-specific well-known URI
11541154
when the SD-JWT VC is verified. This would allow the malicious Issuer to keep track where
11551155
and how often the SD-JWT VC was used.
11561156

11571157
Verifiers are advised to establish trust in an SD-JWT VC by pinning specific Issuer identifiers
1158-
and should monitor suspicious behaviour such as frequently rotating Issuer identifiers.
1159-
If such behaviour was detected, Verifiers are advised to reject SD-JWT VCs issued by such
1158+
and should monitor suspicious behaviour such as frequent rotation of those identifiers.
1159+
If such behaviour is detected, Verifiers are advised to reject SD-JWT VCs issued by those
11601160
Issuers.
11611161

11621162
Holders are advised to reject SD-JWT VCs if they contain easily correlatable information
@@ -1175,14 +1175,14 @@ format encoded as CBOR and secured using COSE.
11751175

11761176
In (#retrieving-type-metadata), various methods for distributing and retrieving
11771177
Type Metadata are described. For methods which rely on a network connection to a
1178-
URL (e.g., provided by an Issuer), third parties (like the Issuer) may be able
1178+
URL (e.g., provided by an Issuer), the Issuer and other third parties may be able
11791179
to track the usage of a credential by observing requests to the Type Metadata URL.
11801180

11811181
Consumers SHOULD prefer methods for retrieving Type Metadata that do not
11821182
leak information about the usage of a credential to third parties. The
11831183
recommendations in (#robust-retrieval) apply.
11841184

1185-
<reference anchor="IANA.well-known" target="http://www.iana.org/assignments/well-known-uris">
1185+
<reference anchor="IANA.well-known" target="https://www.iana.org/assignments/well-known-uris">
11861186
<front>
11871187
<title>Well-Known URIs</title>
11881188
<author>
@@ -1540,6 +1540,7 @@ We would like to thank
15401540
Aaron Parecki,
15411541
Alen Horvat,
15421542
Andres Uribe,
1543+
Andrii Deinega,
15431544
Babis Routis,
15441545
Christian Bormann,
15451546
George J Padayatti,

0 commit comments

Comments
 (0)