- From: Melvin Carvalho <melvincarvalho@gmail.com>
- Date: Wed, 15 Apr 2026 18:40:25 +0200
- To: Christoph Braun <braun3@fzi.de>
- Cc: public-solid@w3.org
- Message-ID: <CAKaEYhJEUyxaiZ2njmgvOwN=k0RZMdhrOhfWzZKCKBgM8u6uuA@mail.gmail.com>
st 15. 4. 2026 v 18:04 odesílatel Christoph Braun <braun3@fzi.de> napsal: > Dear Melvin, > > I am disappointed to see you continuing your disruptive behaviour > despite you announcing to work with the usual process of the CG [1]. > Addressing the issue in the way you currently pursue is disruptive to > the CG and does not provide an environment where feedback feels welcome, > despite you stating otherwise. > > I have already provided feedback on your draft [2,3] and thus deem your > proposal not more secure than the proposal for WAC 1.1 put forward in [4]. > It does not provide the "fail-closed semantics" you desire, despite you > stating otherwise. > It merely modifies the evaluation behaviour regarding a particular part > of authorization evaluation leaving other parts untouched [5]. > > I had already proposed a sound extension to WAC in [6], which was > discussed over a decent period of time. > Rough consensus emerged following the usual process. > I recommend you follow the usual process if you want to engage > meaningfully in the CG and want to be taken seriously in that. > > That is all, > Christoph > Thanks Christoph. I’ll review your point about the extensions section, if there's a gap in the fail-closed guarantee, I'll address it. The draft is open for PRs. For context, the fail-open concern raised on PR #134 received some support, including an upvote from TimBL [1], which motivated me to explore the fail-closed variant further. The draft builds on PR #133, reusing the same condition model and types. I appreciate the earlier technical engagement. Melvin [1] https://github.com/solid/web-access-control-spec/pull/134#issuecomment-4183136080 > > [1] > > https://github.com/solid/web-access-control-spec/pull/134#issuecomment-4184262972 > [2] > > https://github.com/solid/web-access-control-spec/pull/134#issuecomment-4183448327 > [3] > > https://github.com/solid/web-access-control-spec/pull/134#issuecomment-4184233481 > [4] https://github.com/solid/web-access-control-spec/pull/134 > [5] https://webacl.org/secure-access-conditions/#extensions > [6] > > https://github.com/solid/web-access-control-spec/pull/133#issuecomment-3950907935 > > > On 15/04/2026 15:17, Melvin Carvalho wrote: > > Hi all, > > > > I've published a draft extending Web Access Control with > > acl:condition, using fail-closed evaluation semantics: > > > > https://webacl.org/secure-access-conditions/ > > > > Source: https://github.com/webacl/secure-access-conditions > > > > This builds on PR #133 [1] and PR #134 [2], reusing the same > > acl:condition syntax and condition types (acl:IssuerCondition, > > acl:ClientCondition). > > > > The key difference is in evaluation semantics: if a server encounters > > a condition it does not support, the authorization is treated as > > non-applicable. This ensures that access constraints are never > > silently ignored and avoids fail-open behaviour in mixed-capability > > deployments. > > > > This is a breaking change, hence versioned as WAC 2.0. Servers that do > > not understand a condition must reject it, rather than evaluating the > > authorization as if the condition were absent. > > > > Two implementations exist today: > > - JavaScriptSolidServer (JSS) > > - VisionClaw (via JSS) [3] > > > > Feedback is very welcome, particularly from implementers. I’m also > > looking for co-editors and reviewers interested in shaping this work. > > > > Melvin Carvalho > > > > [1] https://github.com/solid/web-access-control-spec/pull/133 > > [2] https://github.com/solid/web-access-control-spec/pull/134 > > [3] https://github.com/DreamLab-AI/VisionClaw > > >
Received on Wednesday, 15 April 2026 16:40:42 UTC