- From: Peter Williams <home_pw@msn.com>
- Date: Tue, 19 Jul 2011 12:43:32 -0700
- To: <kidehen@openlinksw.com>, "public-xg-webid@w3.org" <public-xg-webid@w3.org>
- CC: <dev-identity@lists.mozilla.org>
- Message-ID: <SNT143-w242E5A41A0ADF3C1BC153A924D0@phx.gbl>
webid is only tied to client certs on account of a "adoption goal" - its there. Ive argued (and deployed) the guts of webid when the URI is delivered in a SAML posted assertion to an RP. Since Im a developer, I even built my own SSL client, replacing the X.509 format cert in the cert msg with my own (signed JSON) blob. SSL doesnt care... though obviously deployed https servers do (since few know how to parse my custom cert token in the SSL msg). The debate is not about client certs, therefore. Its about how https is applied. IN webid, the URI is what matters, so it use (in identity mode) FITS with all the logical assumptions of the semantic web. Remember, webid exists to project the semantic web, and the linked data movement. Its design aimed to stay consistent with the axioms of the semantic web. Webid is more than merely looking up a foaf card on the fly, given a URI handle. Now, webid is advanced, compared to browserid (which is a yaap - yet another assertion protocol). The question is, since both movements are competing for browser influence, is: should the infrastrcuture attempt to reach out to the semantic web'goals or not. If not, one does yaap. Traditionally, the number of folks who care about semantic web and/or its AXIOMS are few in number. But those that do care, seem to be able to articulate a next generation web. unfortumatenly, most devleopers could not care less about the next generation web to be had 2 years hence, let alone 5- 10 years. If browserID had any strategic elements in its thought train, it would enable SOME of the webid wider mission, allowigs its assertions to cmmunicate the webid URI, so that the guts of webid processing can take place (with or without the https tie ins) - enabling thereby SOME future advaned capabilites to find their place in the web as-is.Date: Tue, 19 Jul 2011 20:22:45 +0100 From: kidehen@openlinksw.com To: public-xg-webid@w3.org CC: dev-identity@lists.mozilla.org; ben@adida.net Subject: Re: The 3 stack layers of BrowserID and WebID On 7/19/11 1:48 PM, Henry Story wrote: On 19 Jul 2011, at 04:56, Ben Adida wrote: We have different requirements. Not sure we do. At the very least we have different sub-requirements. You want to leverage TLS client-side certs. We specifically don't. Good so this is a big misunderstanding - and a very understandable one of course. WebID leverages TLS and X509 certificates because that is what is available in all current browsers and because it works, not because we love TLS or X509. Mozilla labs can change the technologies in one browser, so you can of course change what is available and so change what WebId needs to run. I think it is important to distinguish the different layers of technology that are being used by the current BrowserId and the current WebID, as I argued on stackexchange article comparing WebID and BrowserID http://bit.ly/na7vsA a. Transport: TLS vs unencrypted tcp/ip b. Cert formats: X509 vs signed JSON c. Auth method: Subject PK verification vs Issuer PK verification From the above table we can see that WebID/foaf+ssl is described by the first column of the table (X509, Subject PK verification) whereas BrowserId is described by the second column of the table (Signed JSON, Issuer PK verification). So that is where we are now. From that perspective it looks like both protocols are like oil and vinegar: they can't mix -- even though they are destined to always be mixed, and then be used to make a good tasting salad. ;-) Mixing depends on details of the email verification protocol. Basically, how they associate public keys and email addresses (maito: URIs). So consider each layer: a. Transport: Does WebID really require TLS (other than for securing the transport)? Not really, what is required is that the browser sign a token with the users private key and for that be the basis of the verification of his identity. b. Cert formats: WebId is designed at the semantic layer, not the syntactic one. So we don't really care if a new certificate format comes along. The same logic applies. So WebID can work very well with signed JSON certificates too. c. Auth method: WebID was going to look at some point at issuer certification verification. Now you have presented a good use case - with the proof that you cared enough to implement something, not just waffle about how useful it could be - we have something to work on. The point is that each element of the stack is orthogonal. Each auth method can be used with either transport layer and with each certification format. Furthermore the authentication methods can be combined! Yes, and this will happen (more than likely) if the email authentication protocol is clear about the relation that connects a mailto: scheme URI to a public key, ultimately this is the key to the matter. Even if they opt not to use or recommend Webfinger. So why am I really excited about the combination of layers currently called BrowserId that you have developed? Well because first you Mozilla *can* change those layers, and secondly you have shown that adoption is then very quick: if services don't need to add TLS they can add distributed identity in an instant. They are less secure than if they did, but one must fight one micro battle at a time. [ So I am assuming here that there are no blocking security issues in what you have built ]. Once this is seen, then I think you will understand that allowing us to explore the WebID auth method as part of your experiment, will not tie you into X509 or TLS. With a bit of thinking we should even be able to work things out so that there is a base protocol that works along the lines of what you have call it - BrowserId 1 - and then a way to enable extensions that would take advantage of WebID authentication - WebId without TLS or X509 let me be very clear! Yep too, but we'll see when the details re. mailto scheme and public key association are clear :-) -- Regards, Kingsley Idehen President & CEO OpenLink Software Web: http://www.openlinksw.com Weblog: http://www.openlinksw.com/blog/~kidehen Twitter/Identi.ca: kidehen
Received on Tuesday, 19 July 2011 19:44:04 UTC