- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Mon, 05 May 2014 08:32:13 -0400
- To: public-webid@w3.org
- Message-ID: <536784CD.6060605@openlinksw.com>
On 5/5/14 7:46 AM, Kingsley Idehen wrote: > On 5/5/14 2:05 AM, Anders Rundgren wrote: >> On 2014-05-04 23:36, Kingsley Idehen wrote: >>> >On 5/3/14 11:13 PM, Anders Rundgren wrote: >>>> >>On 2014-05-03 20:51, Tim Berners-Lee wrote: >>>>>> >>> >On 2014-05 -03, at 10:45, Anders Rundgren<anders.rundgren.net@gmail.com> wrote: >>>>>>>> >>>> >>We can call it whatever we like, the user-experience offered by WebID as featured >>>>>>>> >>>> >>onhttp://cimba.co web doesn't meet reasonable user expectations [..] >>>>>> >>> >So imagine the browser was going to be changed to make that better. >>>>>> >>> > >>>>>> >>> >People seem to widely agree that the client-side cert UI is bad on browsers >>>>>> >>> >Can we at least do a thought experiment to be in a world where it is fixed -- what would that look like? >>>>>> >>> >Maybe things like:- >>>>>> >>> > >>>>>> >>> >- Allowing the user to click a check box on "Always use this persona (client-side cert) with this web site (domain)" >>>>>> >>> >- Allowing a preferences access to manage the persona/website allocation matrix >>>>>> >>> >- Allow more screen space for selecting those certs >>>>>> >>> >- Allow a user to label, color, and suppress certs in the list >>>>>> >>> >- By default, not including expired certs in the list >>>>>> >>> >- Tracking which persona is in use on this website (only when a user has more than one) in the URL bar >>>>>> >>> > >>>>>> >>> >and so on. Maybe is someone sketched the UI then a browser code could be persuaded to do it. >>>>>> >>> >It is necessary for existing client side cert sites anyway, and would maybe make the cimba.co experience >>>>>> >>> >quite reasonable. >>>> >>Hi Tim, >>>> >> >>>> >>The hurdles aren't limited to the UI. The following bug-report for Android >>>> >>http://code.google.com/p/android/issues/detail?id=38393 >>>> >>shows that the server-initiated filtering feature that WebID-TLS presumes is set to "WorkingAsIntended" although it is not even implemented. >>>> >> >>>> >>In the several EU states X.509 client authentication is used quite extensively for on-line banking and e-government services. >>>> >>These systems typically rely on proprietary browser plugins rather than using HTTPS Client Cert Auth. >>>> >>Since plugins are to be "outlawed" by the browser vendors, they are now forced rewriting their systems to invoke local (native) applications to handle the certificate authentication. >>>> >>I.e. they are effectively*giving up on the web* for the authentication part! >>>> >> >>>> >>Due to this and a bunch of other issues related to HTTPS Client Cert Auth, I believe that we need a somewhat bigger "patch" to actually get anywhere. >>>> >> >>>> >>FWIW, I hereby submit a concept and sample implementation which I believe could be a suitable replacement both for the TLS-solution in WebID-TLS as well as for the proprietary systems used in the EU: >>>> >>http://webpki.org/papers/PKI/webauth.pdf >>>> >> >>>> >>I encourage other developers in this space to do the same. >>>> >>The W3C may then run a "beauty contest" and select a concept for standardization:-) >>>> >> >>>> >>Cheers >>>> >>AndersR >>>> >> >>>> >> >>> >Anders, >>> > >>> >Have you looked at how Safari works? The fact that it now uses a timeout to end TLS sessions, that are lingering or deemed "potentially inactive" ? Have you looked at this UX experience on iOS? >>> > >>> >Just asking as I've looked an the Android and your sketch, but don't sense evaluation of iOS. >>> > >>> >Apple is pretty good at UX. Sometimes they do enough just to be better than the competition, so I do tend to look at them first in regards to UX matters, ditto as the place to trigger changes that ultimately percolate to competitors etc.. >>> > >> Kingsley, >> I have not looked into Apple's dealing with TLS sessions or the certificate selection UI, because I don't have to. >> >> The logic behind this somewhat quirky position is that I in similarity to Google, Microsoft, Paypal, ARM, RSA, and most of the EU banks have*rejected* the idea of using HTTPS Client Certificate Authentication as the foundation for strong consumer authentication. The motives probably vary, but I think my write-up contains the primary considerations. > > I looked up your write up prior to replying. Here are your fundamental > issues: > > > . TLS lacks a logout mechanism -- not so on iOS or when using Safari > (which uses a timeout) To verify my point, you can try our WebID verifier [1] using Safari and/or iOS. Note, I've tried yours which basically mandates G+ identity. Initially, simply opt to "Cancel" when the TLS CCA UI is presented. Under normal circumstances, you will not be able to re-use this page without starting a new TLS session, which is achieved by quitting and restarting your browser. In the case of Safari, you simply wait a little, and repeat en route to a TLS CCA challenge. Not being able to configure the timeout (on Mac OS X or iOS) is the only problem I have with the current implementation by Apple. Links: [1] http://id.myopenlink.net/ods/webid_demo.html -- my example which have varying behavior across browsers (e.g., Chrome on Mac OS X or Android will require a restart, but no so when using Safari on Mac OS X or iOS) [2] https://mobilepki.org/webauth/ -- your example -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Monday, 5 May 2014 12:32:38 UTC