Re: RWW Use-Case Example: Web-Scale Ticketing Ideas

> On 20. May 2021, at 19:28, Kingsley Idehen <kidehen@openlinksw.com> wrote:
> 
> On 5/20/21 11:22 AM, Henry Story wrote:
>> 
>>> On 20. May 2021, at 17:17, Kingsley Idehen <kidehen@openlinksw.com> wrote:
>>> 
>>> Changed title to orient focus.
>>> 
>>> Here's what exists currently, putting blockchains aside.
>>> 
>>>  • I can generate an X.509 Certificate (which an expiration date) that functions as my Web Ticket
>>>  • I can ACL protect my RDF documents and even associated services
>>> Adding a blockchain to the mix solves the following:
>> Btw. with Verifiable Credentials we should now be in a position to go beyond X509 - finally!
>> It is also quite possible to bypass the TLS layer for authentication.
>> Finally one can use description logic to describe access rights.
>> 
>> I am trying to bring all these ideas together here:
>> 
>> https://github.com/solid/authentication-panel/blob/main/proposals/HttpSignature.md
>> 
>> One type of description could be ownership of a ticket, signed by the agency giving out the tickets.
> 
> 
> Okay, but don't loose track of the following PKI virtues:
> 
> 1. TLS ubiquity -- supported by every modern OS

HTTP Sig relies on TLS.
It’s just that we don’t rely on client certificate authentication in TLS.

> 
> 2. X.509 ubiquity -- ditto

It will clearly take a very long time for X509 to go away.

> 
> 3. PKCS#12 ubiquity -- ditto

yes.

> 
> Alternatives that exclude the items listed above will inherit
> significant "ubiquity attainment" opportunity costs, IMHO.

The use cases for Verifiable Claims are very different, and mostly on the
client side. Client Side auth with TLS has been pretty much deprecated
by Chrome when they removed the <keygen …> html element from the browser.

> 
> We will certainly add support for HttpSignatures to our stack, but I am
> concerned about bootstrap, on-boarding, and user experience.

It is still in development. Now, I did implement something very similar about
5 years ago with a previous version of Signing HTTP Messages.

What is new is that Signing HTTP messages is now worked on at the IETF HTTP Bis
working Group, that Verifiable Credentials is a standard, (though the signing part
is going to be standardized next) and the use of OWL description logics for attribute
based access control.

I think one can easily get something like WebID-TLS going and simple attribute based
access control done quite quickly, while the other standards get finished, and
we learn from the experience of building up apps and servers that use it.


> BTW -- have you been tracking DPKI [1] ?

No, I had not. But thanks for pointing it out to me. It looks like it is
something I can wait to see how it evolves… :-)

> 
> Links
> 
> [1] http://www.weboftrust.info/downloads/dpki.pdf -- DPKI
> 
> 
> Kingsley
> 
>> 
>>>  • Making my Ticket more copy-proof by tracking ownership via a Blockchain -- rather than depending solely on "private key" access and control on the part of users
>>>  • Handling accounting for future royalties etc
>>> Links:
>>> 
>>> [1] https://medium.com/virtuoso-blog/understanding-our-lod-connectivity-license-offer-2eef8fffaa7e -- example of the X.509 approach that's been in use for a while now re ODBC and JDBC Connectivity to the LOD Cloud
>>> 
>> Henry Story
>> 
>> https://co-operating.systems
>> WhatsApp, Signal, Tel: +33 6 38 32 69 84‬
>> Twitter: @bblfish
>> 
> 
> --
> Regards,
> 
> Kingsley Idehen
> Founder & CEO
> OpenLink Software
> Home Page: http://www.openlinksw.com
> Community Support: https://community.openlinksw.com
> Weblogs (Blogs):
> Company Blog: https://medium.com/openlink-software-blog
> Virtuoso Blog: https://medium.com/virtuoso-blog
> Data Access Drivers Blog: https://medium.com/openlink-odbc-jdbc-ado-net-data-access-drivers
> 
> Personal Weblogs (Blogs):
> Medium Blog: https://medium.com/@kidehen
> Legacy Blogs: http://www.openlinksw.com/blog/~kidehen/
>              http://kidehen.blogspot.com
> 
> Profile Pages:
> Pinterest: https://www.pinterest.com/kidehen/
> Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen
> Twitter: https://twitter.com/kidehen
> Google+: https://plus.google.com/+KingsleyIdehen/about
> LinkedIn: http://www.linkedin.com/in/kidehen
> 
> Web Identities (WebID):
> Personal: http://kingsley.idehen.net/public_home/kidehen/profile.ttl#i
>        : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this

Henry Story

https://co-operating.systems
WhatsApp, Signal, Tel: +33 6 38 32 69 84‬
Twitter: @bblfish

Received on Thursday, 20 May 2021 17:48:34 UTC