W3C home > Mailing lists > Public > public-identity@w3.org > March 2012

Re: Beyond HTTP Authentication: OAuth, OpenID, and BrowserID: Meeting on March 29th at IETF83

From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Tue, 20 Mar 2012 14:42:21 +0200
Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "public-identity@w3.org" <public-identity@w3.org>, Harry Halpin <hhalpin@w3.org>
Message-Id: <43BCDEB3-D521-4EDD-A04D-7383B90CAF6E@gmx.net>
To: Anders Rundgren <anders.rundgren@telia.com>
Hi Anders, 

the issue is that most SDOs care about focusing their work on interoperability aspects rather than on how the actual stuff is implemented. 

It makes sense to put requirements for the secure storage in a future version of the JavaScript CryptoAPI document but it has to be kept at a fairly high level to be useful.

I don't believe it makes sense to touch the hardware or operating system level aspects in any of the document we are talking about here. 


On Mar 20, 2012, at 12:15 PM, Anders Rundgren wrote:

> On 2012-03-20 08:53, Hannes Tschofenig wrote:
>> Hi Anders, 
>> I believe that these topics will be discussed and investigated in the 
>> W3C Web Cryptography Working Group.  Wouldn't you think so?
> Hi Hannes,
> I guess that depends on what you define as the actual topic, right?
> From my watchtower it is the fact that there are only three vendors
> of mobile operating systems and these give you quite limited access
> to core parts through "Apps" which means that if interoperability is
> to be achieved standard are necessary.
> This differs greatly from the previous situation where anybody could
> deploy their proprietary DLLs and EXEs and thus be "Windows compatible".
> There is to my knowledge no SDO who have taken on secure key storage and
> provisioning.  In TCG (which I'm a member of), secure key storage is on
> the menu but the provisioning has been left to vendors to cater for.
> I doubt that any of the vendors in question are prepared discussing this
> topic in a public forum.  Are you actually even allowed to do that?
> The Google wallet (as an example...), is in spite of all the hype not
> publicly described.  One of the reasons is that the NXP-chip is NDA-
> protected.  Since this is the case with most security hardware, I was
> essentially forced switching to Open Security Hardware for my project.
> Cheers,
> Anders
>> Ciao
>> Hannes
>> On Mar 20, 2012, at 7:22 AM, Anders Rundgren wrote:
>>> On 2012-03-19 23:03, Harry Halpin wrote:
>>> I won't make it to IETF 83.   Here comes a short presentation
>>> on how I envision that keys will be dealt with in the future:
>>> http://openkeystore.googlecode.com/svn/trunk/resources/docs/tee-se-combo.pdf
>>> There is a Reference Implementation as well:
>>> http://code.google.com/p/openkeystore/source/browse/trunk/library/src/org/webpki/sks/twolayer/se/SEReferenceImplementation.java
>>> http://code.google.com/p/openkeystore/source/browse/trunk/library/src/org/webpki/sks/twolayer/tee/TEEReferenceImplementation.java
>>> thanx,
>>> Anders Rundgren
>>> http://webpki.org/auth-token-4-the-cloud.html
>>>> Not sure how many people are making it to IETF83, but W3C is hosting an 
>>>> onsite meeting on Thursday to discuss OAuth, BrowserID, OpenID, and the 
>>>> upcoming W3C Web Cryptography Working Group. Everyone is invited!
>>>> ==Beyond HTTP Authentication: OAuth, OpenID, and BrowserID==
>>>> =Time and Location=
>>>> Thursday lunchtime (1130 to 1300) in room 252A just between the SCIM BoF 
>>>> and OAuth WG as part of IETF83 in Paris.
>>>> = Problem Statement=
>>>> While OAuth has solved the authorization problem, currently 
>>>> authentication on the Web is still insecure as it has yet for the most 
>>>> part failed to go beyond user-names and passwords. However, at this 
>>>> point a number of new client-side capabilities, including the 
>>>> possibility of W3C standardized Javascript cryptographic primitives, are 
>>>> emerging and a number of specifications such as OpenID Connect, 
>>>> BrowserID, and discussions over the future of HTTP Auth have shown that 
>>>> there is interest in understanding better how client-side key material 
>>>> can be used to enable a more secure Web authentication. However, there 
>>>> has yet to be consensus on how client-side cryptography can enable 
>>>> higher-security OAuth flows. The purpose of this side meeting is to look 
>>>> at a more coherent picture of how technologies in the space of identity, 
>>>> authentication, and authorization combine and interact and to help frame 
>>>> future work in Web authentication.
>>>> This informal meeting will present a number of proposed technical 
>>>> proposals in brief, including relationships to other existing work (such 
>>>> as RTCWeb and the upcoming W3C Web Cryptography Working Group), and to 
>>>> help frame future work in the area.and then precede with open discussion.
>>>> For any questions, please contact Harry Halpin (hhalpin@w3.org)
>>>> =Schedule:=
>>>> 11:30-11:45 Lightning presentations to "level-set" participants.
>>>> Mike Jones (Microsoft) will present the latest work from JOSE and OpenID 
>>>> Connect
>>>> Eric Rescorla (Mozilla hat on) will present Mozilla Persona and 
>>>> RTCWeb/WebRTC work
>>>> Blaine Cook will present OAuth 2.0
>>>> Harry Halpin (W3C) will present the upcoming W3C Web Cryptography API.
>>>> 11:45-13:00 Open discussion on co-ordination between OAuth, HTTP Auth, 
>>>> OpenID Connect, BrowserID, and W3C.
Received on Tuesday, 20 March 2012 12:42:57 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 20:00:48 UTC