On 03/19/2010 12:39 PM, Story Henry wrote:

Ok, you may say, so why is this interesting to status net, since you already 
have openid? Well the advantage is that you can in fact then also login to any 
server that supports foaf+ssl using 1 click, without having to type in your 
username or password. That is what the openid4.me demo was aiming to show.

This becomes a lot more useful, when people start using many different status 
net microblogging platforms to talk to each other, or if you wanted to login to 
other services that support it. The limitation of OpenId is that the attribute 
exchange specification is very limited in what it can express, and limited in 
the size of what can be transferred. With foaf+ssl we have the whole of the 
semantic web information ready to be used.

Ie, you could easily give access to certain agents to say a party invitation - 
just to take one example out of a million - because they were friends of a 
friends of yours, or perhaps just followers or followers of yours.

That's actually quite clever! I hadn't encountered the FOAF+SSL combination before, so had to dig about a bit to figure out just what it all means. :)

We all know that an encrypted SSL connection will provide your browser with a certificate verifying the identity of the server. Most folks forget that this works both ways -- your browser can also identify *you* to web sites if you have a personal certificate.

Public key encryption means that the certificate can't be faked by anybody else who doesn't have the private key on your computer, but by itself just having a certificate proves only that somebody issued you a certificate. How can we use that to tell who you are without making an explicit agreement with you?

FOAF comes in here to provide a lookup mechanism. The cert includes a link to your FOAF data on the supplying site, which itself will include a verification of the certificate. Based on what it can tell about you from your FOAF data, the site can then decide whether you're allowed access to various resources, or customize itself for you.


To my mind there are two main weaknesses of FOAF+SSL, though:

First, it relies on end-users to manage personal certificates in their browser. Current browsers just don't do a good job of making this easy -- probably in part because it's pretty rarely used! The good news is that the various browser developers are all thinking about ways to better integrate identity management, so this might be "solved" in a year or two.

I would consider this an outright killer for most non-toy usage in the meantime -- only geeks are going to touch it until it's not insane to manage your certs. I'd love to see a plugin to make sure we could make it work though!


Second, from what I can tell it seems pretty limited in terms of server-to-server communications. Sure you can fetch whatever's in the public FOAF, but once you've established identity you'd already have access to that - it's just a matter of knowing the URL.

The real fun part is letting access-controlled data migrate around between multiple services and clients, being machine-readable, usable offline, etc. Unless a service has your private key, it can't make third-party requests on your behalf... it looks like there's at least some talk about delegation but I can't see a clear picture of what's actually specced, working, and interoperable. Do you know of any documentation on the state of things here?

-- brion
_______________________________________________
StatusNet-dev mailing list
StatusNet-dev@lists.status.net
http://lists.status.net/mailman/listinfo/statusnet-dev

Reply via email to