- From: Henry Story <henry.story@bblfish.net>
- Date: Thu, 20 May 2021 19:47:18 +0200
- To: Kingsley Idehen <kidehen@openlinksw.com>
- Cc: Read-Write-Web <public-rww@w3.org>
- Message-Id: <A2F8E0C4-DEDB-4EB9-A689-DAB89118F902@bblfish.net>
> On 20. May 2021, at 19:28, Kingsley Idehen <kidehen@openlinksw.com> wrote: > > On 5/20/21 11:22 AM, Henry Story wrote: >> >>> On 20. May 2021, at 17:17, Kingsley Idehen <kidehen@openlinksw.com> wrote: >>> >>> Changed title to orient focus. >>> >>> Here's what exists currently, putting blockchains aside. >>> >>> • I can generate an X.509 Certificate (which an expiration date) that functions as my Web Ticket >>> • I can ACL protect my RDF documents and even associated services >>> Adding a blockchain to the mix solves the following: >> Btw. with Verifiable Credentials we should now be in a position to go beyond X509 - finally! >> It is also quite possible to bypass the TLS layer for authentication. >> Finally one can use description logic to describe access rights. >> >> I am trying to bring all these ideas together here: >> >> https://github.com/solid/authentication-panel/blob/main/proposals/HttpSignature.md >> >> One type of description could be ownership of a ticket, signed by the agency giving out the tickets. > > > Okay, but don't loose track of the following PKI virtues: > > 1. TLS ubiquity -- supported by every modern OS HTTP Sig relies on TLS. It’s just that we don’t rely on client certificate authentication in TLS. > > 2. X.509 ubiquity -- ditto It will clearly take a very long time for X509 to go away. > > 3. PKCS#12 ubiquity -- ditto yes. > > Alternatives that exclude the items listed above will inherit > significant "ubiquity attainment" opportunity costs, IMHO. The use cases for Verifiable Claims are very different, and mostly on the client side. Client Side auth with TLS has been pretty much deprecated by Chrome when they removed the <keygen …> html element from the browser. > > We will certainly add support for HttpSignatures to our stack, but I am > concerned about bootstrap, on-boarding, and user experience. It is still in development. Now, I did implement something very similar about 5 years ago with a previous version of Signing HTTP Messages. What is new is that Signing HTTP messages is now worked on at the IETF HTTP Bis working Group, that Verifiable Credentials is a standard, (though the signing part is going to be standardized next) and the use of OWL description logics for attribute based access control. I think one can easily get something like WebID-TLS going and simple attribute based access control done quite quickly, while the other standards get finished, and we learn from the experience of building up apps and servers that use it. > BTW -- have you been tracking DPKI [1] ? No, I had not. But thanks for pointing it out to me. It looks like it is something I can wait to see how it evolves… :-) > > Links > > [1] http://www.weboftrust.info/downloads/dpki.pdf -- DPKI > > > Kingsley > >> >>> • Making my Ticket more copy-proof by tracking ownership via a Blockchain -- rather than depending solely on "private key" access and control on the part of users >>> • Handling accounting for future royalties etc >>> Links: >>> >>> [1] https://medium.com/virtuoso-blog/understanding-our-lod-connectivity-license-offer-2eef8fffaa7e -- example of the X.509 approach that's been in use for a while now re ODBC and JDBC Connectivity to the LOD Cloud >>> >> Henry Story >> >> https://co-operating.systems >> WhatsApp, Signal, Tel: +33 6 38 32 69 84 >> Twitter: @bblfish >> > > -- > Regards, > > Kingsley Idehen > Founder & CEO > OpenLink Software > Home Page: http://www.openlinksw.com > Community Support: https://community.openlinksw.com > Weblogs (Blogs): > Company Blog: https://medium.com/openlink-software-blog > Virtuoso Blog: https://medium.com/virtuoso-blog > Data Access Drivers Blog: https://medium.com/openlink-odbc-jdbc-ado-net-data-access-drivers > > Personal Weblogs (Blogs): > Medium Blog: https://medium.com/@kidehen > Legacy Blogs: http://www.openlinksw.com/blog/~kidehen/ > http://kidehen.blogspot.com > > Profile Pages: > Pinterest: https://www.pinterest.com/kidehen/ > Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen > Twitter: https://twitter.com/kidehen > Google+: https://plus.google.com/+KingsleyIdehen/about > LinkedIn: http://www.linkedin.com/in/kidehen > > Web Identities (WebID): > Personal: http://kingsley.idehen.net/public_home/kidehen/profile.ttl#i > : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this Henry Story https://co-operating.systems WhatsApp, Signal, Tel: +33 6 38 32 69 84 Twitter: @bblfish
Received on Thursday, 20 May 2021 17:48:34 UTC