Shade wrote:
> I'm not seeing how this "your Identity is primarily tied to your OP" approach 
> does anything but reinforce walled gardens.

Compare message passing diagrams and you'll realize it's just a semantic 
difference. Every RP implementor I've heard of has misunderstood the current 
delegated and directed identity semantics at first. That's why Mr Norris wrote 
http://willnorris.com/2009/07/openid-directed-identity-identifier-select

I'm sure you, like me, will have no trouble installing your own identity 
provider at your vanity url of choice.

>  It's nice "when people follow the rules": grand, but useless to protect 
> against malicious OP's.

Are you describing a security vulnerability? What rules must be violated for 
malicious OPs to cause damage?

> Postscript: reliance on SSL endpoints - considering how panicky the modern 
> browsers get over self-signed certificates, isn't this discouraging (and 
> effectively disqualifying) users from running their own OAuth/OpenID 
> endpoints?

Yes, and it damn well should. Self signed certificates provide no form of 
authentication, just encryption. OpenID doesn't need the encryption, it needs 
the authentication. If you're feeling fancy, please help develop a distributed 
PKI for XRI. I'm sure the TC would love any implementation suggestions you can 
offer. You might also start campaigning to get clients to start verifying 
DNSSec.

But until we have some other form of authn PKI to bootstrap from, you will eat 
X509 certs with a verifiable chain of authority to a known trust root and you 
will like it. Just like the rest of us.
--
http://josephholsten.com
_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to