- From: Bart van Leeuwen <bart_van_leeuwen@netage.nl>
- Date: Sat, 7 Dec 2013 10:29:51 +0100
- To: public-webid WebID Group <public-webid@w3.org>
- Cc: Anders Rundgren <anders.rundgren.net@gmail.com>, Andrei Sambra <andrei@fcns.eu>, Stéphane Corlosquet <scorlosquet@gmail.com>, Henry Story <henry.story@bblfish.net>
- Message-ID: <OF4A304CDC.B319D6FE-ONC1257C3A.0033A564-C1257C3A.00342BC9@netage.nl>
Henry Story <henry.story@bblfish.net> wrote on 07-12-2013 08:59:28: > On 3 Dec 2013, at 07:42, Anders Rundgren > <anders.rundgren.net@gmail.com> wrote: > > > Hi Guys, > > I took a peek in this document: > > https://dvcs.w3.org/hg/WebID/raw-file/tip/spec/tls-respec.html > > > > FWIW, I want to provide some input on this. I believe that X.509 > user authentication will become a major activity but not in the way > it was "meant" [using TLS CCA (Client Certificate Authentication)]. > How can I be so sure about that you may [rightfully] wonder? Well, > to begin with the majority of eID networks today do not actually use > TLS-CCA, but rather rely on non-standard "plugins". > > > > There are some pretty good reasons for that: > > http://webpki.org/papers/PKI/webauth.pdf#page=1 <http:// > webpki.org/papers/PKI/webauth.pdf> > > > > Using "plugins" is of course not great (they will actually soon be > "outlawed"!) so therefore Google has created something called U2F > (Universal Two Factor) authentication which like the plugins and > WebAuth works on the application level rather than on the transport > level. This will be the final nail in the TLS CCA coffin. > > > > Fortunately this in no way makes WebID redundant! > > > > However, I would consider another solution for "signaling" a WebID > since WebIDs differs in one respect from most (if not all) other X. > 509-based user authentication schemes by not mandating a known CA. > A specific extended key usage WebID-flag would be fine and would not > be in conflict with anything out there. Assigning new semantics to > existing definitions like SubjectAltName is not a fully future-proofsolution. +1 > We have an independent reason to want to signal the existence of > WebID and that is covered in > > "ISSUE-62: null certificate_authorities list" > http://www.w3.org/2005/Incubator/webid/track/issues/62 > > The problem with the server requesting a client certificate with > the "null certificate authorities list" is that > it means that the server will accept ANY certificate. > > But this is usually not the case. > > As a result of the client being requested the certificate using the > "null certificate authorities list" the Web Browser may offer the user > a list of certificates many of which may not be signed by any known > CA _and_ that is not WebID enabled either, leaving the server to > have to reject the certificate. And it is not always possible to do that > for the server once he has accepted the certificate. It would also make > the interaction with the client very bizarre, as the client would offer > the user a number of certificates to choose from, many of which would > keep getting refused, with little explanation. > > I think the best solution I have found to this for the moment is for us > to signal a WebID signed certificate by having it be signed by a "Self > Signed" DN perhaps the > > CN=WebID, O={} -1000 During TPAC2012 I already expressed concerns for this approach. I run IBM Domino which acts both as a mail, application and directory server. I've managed to attach a WebID to my account with the certificate chain ( self signed ) of my company. If I would have to adopt the above principle, I would have to recreate the whole certificate chain. Furthermore everything that is signed will need to contain WebID in the certificate chain. If you look for a way to prevent wide adoption, then do this. Back then I already explained that creating WebIDs from e.g. a AD-server could be straight forward. But I really doubt any large company looks forward to resigning and recreating all its directories just becuase of WebID. Met Vriendelijke Groet / With Kind Regards Bart van Leeuwen ############################################################## # twitter: @semanticfire # netage.nl # http://netage.nl # Enschedepad 76 # 1324 GJ Almere # The Netherlands # tel. +31(0)36-5347479 ##############################################################
Received on Saturday, 7 December 2013 09:41:18 UTC