- From: Henry Story <henry.story@bblfish.net>
- Date: Sun, 7 Oct 2012 22:21:13 +0200
- To: Melvin Carvalho <melvincarvalho@gmail.com>
- Cc: "public-webid@w3.org" <public-webid@w3.org>
- Message-Id: <7706BAFE-1AD0-4A33-9AF7-67755487151A@bblfish.net>
On 7 Oct 2012, at 21:16, Melvin Carvalho <melvincarvalho@gmail.com> wrote: > > > On 6 October 2012 12:03, Henry Story <henry.story@bblfish.net> wrote: > > On 6 Oct 2012, at 12:01, Melvin Carvalho <melvincarvalho@gmail.com> wrote: > >> >> >> On 6 October 2012 11:42, Henry Story <henry.story@bblfish.net> wrote: >> >> On 6 Oct 2012, at 11:39, Melvin Carvalho <melvincarvalho@gmail.com> wrote: >> >>> >>> >>> On 6 October 2012 11:25, Henry Story <henry.story@bblfish.net> wrote: >>> >> >>> >> (1) I think solves the unlinkability problem >>> > >>> > Can you explain what the unlinkeability problem is? Or for who it is a problem? >>> > >>> > 4. Unlinkability >>> > >>> > Definition: Unlinkability of two or more Items Of Interest (e.g., >>> > subjects, messages, actions, ...) from an attacker's perspective >>> > means that within a particular set of information, the attacker >>> > cannot distinguish whether these IOIs are related or not (with a >>> > high enough degree of probability to be useful). >>> > >>> > This is something Harry brought up. >>> >>> Can you explain why it is problematic. It is not because he brought it up >>> that it is problematic right? Or is he someone who sets the standards >>> of what is or is not problematic? Through what authority? >>> >>> Harry stressed that this was a key consideration to him. As an influential member of the social web (he was chair of the W3C Social Web XG), I would consider his opinions important. His complain was that he raised this before, and that the webid group did not look at it. >> >> But you have not summarised in your own words what his complaint is. So how do you know we did not answer it? >> >>> >>> If we, as a group, are able to address such concerns, or show that we have evaluated them and proven then are non issues (for example in a FAQ), it may help bring the benefits of WebID to a wider audience. >> >> That is why I ask you to express in your words what the problem is, and see if you can come up with an answer to the >> problem. And indeed we should add this on a list of question and answers that comes up. >> >> I have quoted the passage cited by Hannes, Harry and others. > > yes, but you have to develop that passage and see how it applies to WebID. It is not an obvious passage at all, and it is not clear it applies at all to WebID. > >> It's something we (as a group) have been asked to look at. In truth, it's been quite a hard conversation to follow as there were many replies and points raised in a short period of time. I dont know if unlinking the public key from the URI provides more 'unlinkability', it was just a suggestion. > >> >> But it seems unclear to me that the concerns have been addressed. > > Well I did in fact answer that mail. But I am going to send out a new mail right now, to make sure it is clear. > >> Certainly there was no acknowledgement of that. > > By whome? By Harry? He never acknowledges mails that don't go in his direction. > > OK, I've managed to look through a lot of this now. > > Unlinkability seems to be useful when you want to provide anonymity or pseudo anonymity. [[ Unlinkability: Within a particular set of information, a state in which an observer or attacker cannot distinguish whether two items of interest are related or not (with a high enough degree of probability to be useful to the observer or attacker). ]] Unlinkability is with respect to an attacker or observer. So one has to ask who the attacker or observer is. In the case of wikileaks, the attacker is the person who wishes to find out who posted the leak. They want to correlate that person to something else presumably. In the case of the social web, it is going to be quite complex who is an attacker. I think to be able to specify this one would have to look at the access control on a resource. If I want to make a resource available to a group of friends, then they cannot be the attacker. The attacker would be someone who is not my friend being able to look at the TLS traffic and work out who is connecting. It would be interesting to see what TLS+Tor gives one there in terms of improvement. If the web site you are connecting to is the attacker, then you want to minimise their ability to correlate your buying decision for X with another buying decision for Y on another site. There you'd just create a local account on that site, and then use some form of e-payment. But you'd not want to give them any interesting info about you or else they'd soon be able to identify you - and there the e-payment system is already problematic. So what unlinkability means depends very strongly on who is thought to be attacking who. > > Both valuable use cases. > > I am guessing the perception of those that have never tried webid may be that the certificate is sent *every* time. > > This can be avoided as follows: > > - Do not send a cert when the popup arises yes, usually there is cancel button on the cert selection box. Or: don't click the login button. > - Use a different browser Or a different person in the same browser, as in Chrome's Profile options. > - We create a public cert at http://webid.info/#anon I am not sure that would be useful. Just don't log in. But perhaps for sites that require certificates? > > Pseudo anonymous identifies can be provisioned by WebID yes, pseudonyms > > - One cert per identity Not sure how that helps > > Linkabiity is desirable in many cases as stated in the final paragraph of the IETF draft. Well spotted, thanks: [[ Achieving anonymity, unlinkability, and undetectability may enable extreme data minimization. Unfortunately, this would also prevent a certain class of useful two-way communication scenarios. Therefore, for many applications, a certain amount of linkability and detectability is usually accepted while attempting to retain unlinkability between the data subject and his or her transactions. This is achieved through the use of appropriate kinds of pseudonymous identifiers. These identifiers are then often used to refer to established state or are used for access control purposes, see [I-D.iab-identifier-comparison]. ]] > > BrowserID aka persona seems not to solve this issue as the cert sends: > > - The user's email address. > - The user's public key for that address on that browser. > - The time that the certificate was issued. > - The time that the certificate expires. > - The IdP's domain name. > > Additionally your webmail provider and/or mozilla can impersonate you as they control your private key server side. My guess is that with web crypto in the browser that will go. But until then perhaps. But I am not quite sure it is that: I think that they control the signature. And the signature means they can make a private key at will. That is the same problem with WebID btw. But it's not a problem if you have a FBox webid, because then you control it. The server serving the page is a key agent in this system. It is the @ sign of the e-mail address - FBox: henry.story@henry.story ( you control your box) - Uni: henry.story@ic.ac.uk ( you are part of a bigger agency ) Each has its advantages. Anyway even with Web Crypto in the browser the only advantage BrowserId has is that the certificates are changed a lot so you can verify the cert just by checking the signature. (If you don't care to have 1 day error ) But the value of WebID for social web is of course all the other relations you can access. And of course they will want those too. So that is why my point was from the beginning to Harry: you can't defend BrowserID and slam WebID simultaneously. It's inconsistent. Harry's only point is that your profile server might be able to track where you go, and even that is only very weakly true. And its hardly interesting in most cases anyway, since it is your own profile server that may possibly be able to know. I think you can find out who is behind this if you ask "who would this be problematic for?" Certainly not for people with FBoxes. > By extension any agency that requests information from your webmail provider or mozilla can view your external data. > > Furthermore, your webmail provider and/or mozilla can sign you up for any services offered by a relying party *without you even knowing*. Why is that? > This is quite scary in privacy terms and has me thinking twice whether I want to use BrowserID as a fallback to WebID, as was my original intention. Perhaps let the user decide. yes, but I am not sure quite what the FAQ would be here other than "What is the distinction between WebID and BrowserID?" http://security.stackexchange.com/questions/5406/what-are-the-main-advantages-and-disadvantages-of-webid-compared-to-browserid But I am not sure what the question would be that Harry is asking, other than FUD > > Maybe we should add these points to an FAQ We should certainly link to that article in the FAQ, and also perhaps move the FAQ to our wiki, or at least move the FAQ to the w3c WebID/FAQ from the foaf+ssl/FAQ But yes getting back to Linkability, the answer has to be - 1. The importance of linkability (see my previous mail) - 2 Who is your enemy? then one could make a table, and for each on suggest an answer the site you re logging into: don't use webid Otherwise I am not really sure what one can say here yet that is that interesting - ie not something that ends up falling down to TLS level issues which might be fixed with other systems such as Tor. > > >> Perhaps it is the nature of mailing lists that it can be challenging to know when a consensus is reached or a problem has been solved. >> >> >> Henry >> >> >>> >>> >>> Henry >>> >>> Social Web Architect >>> http://bblfish.net/ >>> >>> >> >> >> Social Web Architect >> http://bblfish.net/ >> >> > > > Social Web Architect > http://bblfish.net/ > > Social Web Architect http://bblfish.net/
Attachments
- application/pkcs7-signature attachment: smime.p7s
Received on Sunday, 7 October 2012 20:21:56 UTC