- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Thu, 20 May 2021 20:44:43 -0400
- To: public-rww@w3.org
- Message-ID: <6092565c-7d9e-89da-f531-b4ca351885ab@openlinksw.com>
On 5/20/21 1:47 PM, Henry Story wrote: > >> On 20. May 2021, at 19:28, Kingsley Idehen <kidehen@openlinksw.com> wrote: >> >> On 5/20/21 11:22 AM, Henry Story wrote: >>>> On 20. May 2021, at 17:17, Kingsley Idehen <kidehen@openlinksw.com> wrote: >>>> >>>> Changed title to orient focus. >>>> >>>> Here's what exists currently, putting blockchains aside. >>>> >>>> • I can generate an X.509 Certificate (which an expiration date) that functions as my Web Ticket >>>> • I can ACL protect my RDF documents and even associated services >>>> Adding a blockchain to the mix solves the following: >>> Btw. with Verifiable Credentials we should now be in a position to go beyond X509 - finally! >>> It is also quite possible to bypass the TLS layer for authentication. >>> Finally one can use description logic to describe access rights. >>> >>> I am trying to bring all these ideas together here: >>> >>> https://github.com/solid/authentication-panel/blob/main/proposals/HttpSignature.md >>> >>> One type of description could be ownership of a ticket, signed by the agency giving out the tickets. >> >> Okay, but don't loose track of the following PKI virtues: >> >> 1. TLS ubiquity -- supported by every modern OS > HTTP Sig relies on TLS. > It’s just that we don’t rely on client certificate authentication in TLS. Okay, so TLS Client Certificate Authentication (CCA) is negated -- which is also the perceived source of UX headache re WebID-TLS. > >> 2. X.509 ubiquity -- ditto > It will clearly take a very long time for X509 to go away. I doubt it will ever go away i.e., has become critical infrastructure hence its support across all modern operating systems. > >> 3. PKCS#12 ubiquity -- ditto > yes. > >> Alternatives that exclude the items listed above will inherit >> significant "ubiquity attainment" opportunity costs, IMHO. > The use cases for Verifiable Claims are very different, and mostly on the > client side. Client Side auth with TLS has been pretty much deprecated > by Chrome when they removed the <keygen …> html element from the browser. I wouldn't really frame it that way re <keygen/>. Remember, that's simply about credentials generation which has now been replaced by Web Crypto implemented as a library across all the major browsers i.e., You can generate a keypair from the browser in a user-friendly way. We even offer an extension that does that [1]. > >> We will certainly add support for HttpSignatures to our stack, but I am >> concerned about bootstrap, on-boarding, and user experience. > It is still in development. Now, I did implement something very similar about > 5 years ago with a previous version of Signing HTTP Messages. Yes, I am aware of that :) > > What is new is that Signing HTTP messages is now worked on at the IETF HTTP Bis > working Group, that Verifiable Credentials is a standard, (though the signing part > is going to be standardized next) and the use of OWL description logics for attribute > based access control. That's all good, but I am still concerned about an important issue re the nature of credentials i.e., are these credentials user or application controlled. * * *User Controlled Credentials Situation Example* 1. X.509 Cert and associated Private Key 2. Items above stored to a user's Keystore (e.g., Keychain on macOS or equivalent on Windows) or a PKCS#12 file A user is fully aware of the above, in regards to credentials and their use for authentication using various authentication protocols. *Application Controlled Credentials Situation Example* 1. JWT replaces X.509 Cert 2. CStorage is to a Browser's Storage (e.g., across cookies, local storage, session storage, and even the more recent token storage feature) A user is typically oblivious to these credentials i.e., applications control the flow of credentials, somewhat surreptitiously . > > I think one can easily get something like WebID-TLS going and simple attribute based > access control done quite quickly, while the other standards get finished, and > we learn from the experience of building up apps and servers that use it. Sure, but the issues I raise above are very important. > > >> BTW -- have you been tracking DPKI [1] ? > No, I had not. But thanks for pointing it out to me. It looks like it is > something I can wait to see how it evolves… :-) Okay. Links: [1] https://chrome.google.com/webstore/detail/openlink-youid/kbepkemknbihgdmdnfainhmiidoblhee?hl=en -- quietly released for now [2] https://security.stackexchange.com/questions/128185/jwt-vs-client-certificates -- JWT vs X.509 Client Certificate Kingsley > >> Links >> >> [1] http://www.weboftrust.info/downloads/dpki.pdf -- DPKI >> >> >> Kingsley >> >>>> • Making my Ticket more copy-proof by tracking ownership via a Blockchain -- rather than depending solely on "private key" access and control on the part of users >>>> • Handling accounting for future royalties etc >>>> Links: >>>> >>>> [1] https://medium.com/virtuoso-blog/understanding-our-lod-connectivity-license-offer-2eef8fffaa7e -- example of the X.509 approach that's been in use for a while now re ODBC and JDBC Connectivity to the LOD Cloud >>>> >>> Henry Story >>> >>> https://co-operating.systems >>> WhatsApp, Signal, Tel: +33 6 38 32 69 84 >>> Twitter: @bblfish >>> >> -- >> Regards, >> >> Kingsley Idehen >> Founder & CEO >> OpenLink Software >> Home Page: http://www.openlinksw.com >> Community Support: https://community.openlinksw.com >> Weblogs (Blogs): >> Company Blog: https://medium.com/openlink-software-blog >> Virtuoso Blog: https://medium.com/virtuoso-blog >> Data Access Drivers Blog: https://medium.com/openlink-odbc-jdbc-ado-net-data-access-drivers >> >> Personal Weblogs (Blogs): >> Medium Blog: https://medium.com/@kidehen >> Legacy Blogs: http://www.openlinksw.com/blog/~kidehen/ >> http://kidehen.blogspot.com >> >> Profile Pages: >> Pinterest: https://www.pinterest.com/kidehen/ >> Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen >> Twitter: https://twitter.com/kidehen >> Google+: https://plus.google.com/+KingsleyIdehen/about >> LinkedIn: http://www.linkedin.com/in/kidehen >> >> Web Identities (WebID): >> Personal: http://kingsley.idehen.net/public_home/kidehen/profile.ttl#i >> : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this > Henry Story > > https://co-operating.systems > WhatsApp, Signal, Tel: +33 6 38 32 69 84 > Twitter: @bblfish > -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Home Page: http://www.openlinksw.com Community Support: https://community.openlinksw.com Weblogs (Blogs): Company Blog: https://medium.com/openlink-software-blog Virtuoso Blog: https://medium.com/virtuoso-blog Data Access Drivers Blog: https://medium.com/openlink-odbc-jdbc-ado-net-data-access-drivers Personal Weblogs (Blogs): Medium Blog: https://medium.com/@kidehen Legacy Blogs: http://www.openlinksw.com/blog/~kidehen/ http://kidehen.blogspot.com Profile Pages: Pinterest: https://www.pinterest.com/kidehen/ Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen Twitter: https://twitter.com/kidehen Google+: https://plus.google.com/+KingsleyIdehen/about LinkedIn: http://www.linkedin.com/in/kidehen Web Identities (WebID): Personal: http://kingsley.idehen.net/public_home/kidehen/profile.ttl#i : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this
Received on Friday, 21 May 2021 00:45:01 UTC