- From: Bryan Newbold <bryan@blueskyweb.xyz>
- Date: Sun, 3 Nov 2024 11:06:46 -0800
- To: "Emelia S." <emelia@brandedcode.com>
- Cc: Social Web Incubator Community Group <public-swicg@w3.org>, Aaron Parecki <aaron@parecki.com>
- Message-ID: <CABFYohga9cZfA_yjE51Zs0v3aVLsK94havLARBp-qOrTWureAg@mail.gmail.com>
Thanks for the link correction Emelia! Relevant to DIDs and DNS, I also just noticed an alternative "all dispatch" session on DIDs in DNS ("High Assurance DIDs with DNS"). New to me, recommends DNS URI records, and TLSA certificates: https://datatracker.ietf.org/meeting/121/materials/agenda-121-alldispatch-04 --bryan On Sun, Nov 3, 2024 at 10:30 AM Emelia S. <emelia@brandedcode.com> wrote: > Hey Bryan, > > Great to see you on the mailing list! > > Thanks for the information about the DNSOP WG sessions, I would've missed > those otherwise! > > Small correction to the OAuth Sessions link: > https://datatracker.ietf.org/doc/agenda-121-oauth/ > > Correct, OAuth Client ID Metadata Documents were designed to address the > problem in the Fediverse with requiring OAuth Client Registration ahead of > authorization. For instance, one server I have data from has 40,000-ish > people using it, but 465,000 registered OAuth applications. Most of these > applications are a 1:1 mapping to an access token as well. Obviously > managing 465,000 OAuth Applications isn't feasible, and a lot of this comes > down to the client needing to generate a new registration for each install > because it needs a Client ID (and in Mastodon, currently a Client Secret, > because we don't yet support Public Clients, only Confidential Clients, > despite majority of clients actually classifying as Public Clients). > > This internet draft came out of a call Aaron and myself had in the middle > of May 2024, where we wanted to figure out "what are the blockers to > getting FedCM / IndieAuth implemented in Mastodon?". We came to the > conclusion that a major problem was the need to pre-register clients with > the OAuth Authorization Server, where instead of having a 1 to Many > relationship, as is common in OAuth, in the Fediverse we have a Many to > Many relationship between Authorization Servers and Clients. > > The Solid Project, which I previously worked on, had a similar problem. > They solved it with an extension to their OIDC implementation called Solid > Client Identifiers / Client ID Documents ( > https://solidproject.org/TR/oidc#clientids), however we couldn't just use > that directly since it required JSON-LD and was in the scope of the Solid > specifications. > > We had to lift it up to the scope of the IETF OAuth WG, whilst maintaining > backwards compatibility with Solid's specification and implementations > (that's why we allow unknown keys in the Client ID Metadata Documents, > specifically to allow for @context in Solid's implementation). > > You can read more about the history of OAuth Client ID Metadata Documents > here: > https://medium.com/@thisismissem/introducing-oauth-client-id-metadata-documents-a347b538e21c > > — Emelia Smith > > On 31 Oct 2024, at 21:45, Bryan Newbold <bryan@blueskyweb.xyz> wrote: > > Hi Folks! > > I've been a lurker here on the list for a bit, but never introduced > myself. I'm Bryan Newbold, I work at Bluesky on the AT Protocol > ("atproto"). I previously worked at the Internet Archive, and was involved > with the dweb events they have organized over the years, and contributed to > the dat protocol. I'm using my work email here for convenience, but can > also be reached at my personal email bnewbold@robocracy.org. > > I wanted to cross-pollinate a couple sessions next week at the IETF which > might be of interest to folks here, around auth and identity systems. I > hope this is appropriate and in the spirit of coordination between > standards groups. The complete agenda/schedule is at > https://datatracker.ietf.org/meeting/121/agenda > > The first are some OAuth sessions: > https://datatracker.ietf.org/meeting/121/materials/agenda-121-dnsop-01 > > Aaron Pareki will be presenting updates to the "OAuth Client ID Metadata > Document" draft ( > https://datatracker.ietf.org/doc/draft-parecki-oauth-client-id-metadata-document/). > Emelia Smith is a co-author and I believe this work originally came out of > plans and ideas for client/server OAuth in the ActivityPub ecosystem. We > ended up adopting this draft for the atproto OAuth profile. > > There is also a session on "OAuth 2.1" which might be relevant to the > overall direction of the OAuth ecosystem. > > The second are some sessions in the DNSOP working group: > https://datatracker.ietf.org/meeting/121/materials/agenda-121-dnsop-01 > > My co-authors and I will be presenting on "Integration of DNS Domain Names > into Application Environments" ( > https://datatracker.ietf.org/doc/draft-sheth-dns-integration/). This > touches on using domain names as "handles" in social applications. We also > had a session at the recent W3C TPAC on this topic ( > https://www.w3.org/events/meetings/4063788d-6e26-4d19-8898-d7ceb448fca9/), > which I probably should have mentioned on this list ahead of time. > > There is also a related draft ( > https://datatracker.ietf.org/doc/draft-ietf-dnsop-domain-verification-techniques/) > around the mechanics of how to verify associations between a domain and > account or service. > > --bryan > https://social.coop/@bnewbold > > >
Received on Sunday, 3 November 2024 19:07:01 UTC