- From: Melvin Carvalho <melvincarvalho@gmail.com>
- Date: Sun, 2 Jun 2013 11:52:18 +0200
- To: Miles Fidelman <mfidelman@meetinghouse.net>
- Cc: "public-fedsocweb@w3.org" <public-fedsocweb@w3.org>
- Message-ID: <CAKaEYh+3+1G9t+hN1vX2oYRKVqBTy5_fC+BpcbMfJhPiCJW3MQ@mail.gmail.com>
On 2 June 2013 05:33, Miles Fidelman <mfidelman@meetinghouse.net> wrote: > Melvin Carvalho wrote: > >> >> >> >> On 1 June 2013 23:16, Miles Fidelman <mfidelman@meetinghouse.net <mailto: >> mfidelman@**meetinghouse.net <mfidelman@meetinghouse.net>>> wrote: >> >> Melvin Carvalho wrote: >> >> >> I'm totally for using X.509 certificates for this and have >> been arguing several years for their adoption. The bigcos are >> blocking it so far due to UX. We were unable to get >> status.net <http://status.net> <http://status.net> to support >> >> it even though we had people ready to work on the code. By >> all means do try and get X.509 deployed, I'll write code for >> it, and support your messaging, but expect pushback due to the >> X.509 user experience. >> >> >> X.509 is in extremely widespread use (can you say U.S. Federal >> Government), it's built into browsers and mail clients, there are >> modules to support it for Apache and other major web browsers, and >> there's infrastructure for generating and managing certificates. >> >> The problem is not with the technology, or its implementation. >> The problem is that key players don't want to adopt ANY open >> identity/authentication mechanism. Creating yet another >> technology or protocol won't change that. >> >> >> The key players tend to push the trusted third party paradigm and that is >> understandable as it is a business model. But it's not the only way, so >> long as there is choice, then the end user has a chance to choose their >> paradigm. >> >> > Umm... X.509 IS trusted third party model - it requires a chain of trust > back to a certificate granting authority. > > As to end users choosing their paradigms, how can you possibly have an > electronic identity/authentication model where everybody > self-authenticates? You (or a system) has absolutely no way of knowing if > I'm really Miles Fidelman (or which Miles Fidelman I am), without some kind > of chain-of-trust that involves either: > i. a trusted third party who vouches for my electronic credentials, or, > ii. a face-to-face exchange of crypto keys - and you still need some way > to verify that I'm who I claim to be in person, like photo id issued by, > you guessed it, a trusted 3rd party). > > For any kind of identity/authentication system to be useful - particularly > in a federated environment - it has to be broadly adopted and standardized, > not a matter of individual choice by each end user. > > And.. there has to be some kind of trusted third party / infrastructure > involved, otherwise there's no basis for trusting the credentials that > anyone presents. > > The questions come down to things like: > - top-down vs. distributed identity provision (e.g. x.509 certificates > that tier up to an ultimate authority vs. organization-based identity > providers like OpenID or Shibboleth) > - schemes that require real-time authentication against a server (e.g., > OpenID) vs. schemes that don't require real-time authentication (e.g, > crypto credentials) > - where do access control decisions get made - at individual systems or by > access control servers (e.g., Kerberos) > > The issues are not technical ones - they're sociological, economic, and > organizational. We have multiple, well-established, well proven models for > distributed identity/authentication/access control - both proprietary and > open standards. > > - US government agencies, and the DoD in particular, use X.509 certificate > based identity/authentication on a global basis, across 1000s of > organizational units and millions of users (including contractors and other > non-government organizations). There are probably millions of people > carrying CAC cards, plugging them into computers with CAC card readers on > a daily basis, and using those credentials to access various government web > sites. > > - I'd guess the number of people who use MS Outlook, Exchange, and > Sharepoint - backed by Active Directory services, is closer to a billion. > > - In the university community, we have widespread use of Shibboleth and > Kerberos. > > - There's quite a lot of OpenID floating around (which, I believe, is the > underlying mechanism for "login with your [FaceBook|Google|Twitter|... > account]") > > - Drupal sites support federated identity. > > One of my favorite examples of all the pieces, all integrated nicely > together, is MIT's Shibboleth-based Touchstone authentication system. It > supports identity/authentication by: > - MIT Kerberos username/password > - MIT issued X.509 certificate > - federated authentication across members of the "InCommon Federation" - > consisting of about 500 different organizations (universities, government > agencies, corporate sponsors, etc.) > And provides single-sign-on access to both MIT-based resources and > resources across federated institutions. > Details at http://ist.mit.edu/touchstone > > And lest we forget: > - Google and Facebook both provide global, 3rd party > identity/authentication services, as, in a sense, do: > - MasterCard, Visa, American Express, PayPal, etc. (what is a credit card > number if not an identity, what is payment if not authentication?) > > There's no lack of technology (models, protocols, software), or > infrastructure (key generation, identity/authentication servers, access > control servers, organizational/institutional support), and no lack of > adoption. > > If the issue is: Why is everyone using Facebook as the identity provider > for social networking, the answers are: > 1. They're not - Google and Twitter iare giving them a run for the money > 2. They're an 800 pound gorilla that's cut deals with lots of different > places (you can still set up an individual account on HuffPost, Disqus, and > 100s of other sites; but it's sure a lot easier to simply click "log in > with facebook" - and in some cases, like Zynga games, it's become > impossible to recover a forgotten password, so facebook becomes the only > way to log in) > > Again - there simply isn't a technology question here, it's a a > cultural/economic/**organizational/.... question - what are the factors > that lead to adoption of one scheme and infrastructure over another? > > Why, by the way, does not mean there aren't serious issues, such as: > > 1. the standard ones of lost/stolen/forgotten credentials and mechanisms > for dealing with these situations > > 2. permanent credentials, and more specifically what happens when someone > stops paying - be it not paying an annual renewal fee, graduating from the > institution that provides your identity service, leaving a job, etc. > > 3. what happens when you die (to accounts, to data locked up behind your > key, etc.) > > Which, I might add, are again organizational and legal issues, not > technical ones. (There are plenty of models for permanent email addresses, > maintained by universities and professional organizations; key escrow; you > can always put stuff in your will - but there's no widespread consensus on > standard practices.) > -1 > > > > Miles Fidelman > > > > -- > In theory, there is no difference between theory and practice. > In practice, there is. .... Yogi Berra > > >
Received on Sunday, 2 June 2013 09:52:46 UTC