-
A couple of days ago OIDC stopped working for one of my users, although I can still log in fine. We've tried clearing cookies, refreshing, forcing logouts, wiping the on-disk cache and many other things, all to no avail. We use JetBrains Hub as the OIDC provider and in the logs we can see this:
So, Hub appears to be returning a token that's larger than the max size accepted by the plugin (which is hard coded). I suspect that what's being returned maybe isn't a token at all but some HTML or other junk, as otherwise it's hard to explain the size, but I don't know how to see what's going on here. Does anyone know how to debug this? I should note that the Hub logs look good - as far as it's concerned, this user is logging in just fine. Plus, other apps that use this SSO are still working for him. It's just Apache that has suddenly got unhappy. Also, we're using version 2.4.1-1 which is the one that came with the old-ish Ubuntu LTS we're using. Is it maybe too old? |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 8 replies
-
either the token or the error returned from the token endpoint is larger than 1Mb; in both cases I think there's something going on that is not right for that user on the OP side; it is probably worth to look at the logs there; I could provide a custom bulid that allows for >1 Mb responses but I'm not sure that that is the way to go (other than for debugging purposes) |
Beta Was this translation helpful? Give feedback.
-
@mikehearn after thinking this over I still believe that the ID token - since it represents an authentication event - should not contain these claims, but on the other hand:
So I've committed a patch that allows handling this situation in a better way 2865154 and uploaded a build for you to test/confirm here: https://www.mod-auth-openidc.org/downloads/libapache2-mod-auth-openidc_2.4.12.4rc1-1.focal_amd64.deb In summary: all claims should be processed, and if they present a problem later on in the cache/cookie/storage, they can be black- or white-listed by https://github.com/OpenIDC/mod_auth_openidc/blob/v2.4.12.3/auth_openidc.conf#L955-L963 |
Beta Was this translation helpful? Give feedback.
@mikehearn after thinking this over I still believe that the ID token - since it represents an authentication event - should not contain these claims, but on the other hand:
OIDCBlackListedClaims
primitive that can be used to filter out unwanted/unfit claims from both sourcesSo I've committed a patch that allows handling this situation in a better way 2865154 and uploaded a build for you to test/confirm here: https://www.mod-auth-openidc.org/downlo…