Re: [apps-discuss] What auth server supplies email addresses? Was webfinger discussion

Alessandro Vesely <vesely@tana.it> Mon, 02 April 2012 13:33 UTC

Return-Path: <vesely@tana.it>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD0D421F84F7 for <apps-discuss@ietfa.amsl.com>; Mon, 2 Apr 2012 06:33:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.419
X-Spam-Level:
X-Spam-Status: No, score=-3.419 tagged_above=-999 required=5 tests=[AWL=1.300, BAYES_00=-2.599, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ClIgl74jrAr0 for <apps-discuss@ietfa.amsl.com>; Mon, 2 Apr 2012 06:33:03 -0700 (PDT)
Received: from wmail.tana.it (www.tana.it [62.94.243.226]) by ietfa.amsl.com (Postfix) with ESMTP id 3CAC121F84F1 for <apps-discuss@ietf.org>; Mon, 2 Apr 2012 06:33:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=test; t=1333373581; bh=onKNlj7bfcryaao6Oc0TDmT/VVSDl3H6zxKBbW8sGSE=; l=4682; h=Message-ID:Date:From:MIME-Version:To:CC:References:In-Reply-To: Content-Transfer-Encoding; b=HUIrSRopwdeTlqlm7Ck+ZjI2E93qdIahFUbWKbP96ULoVFsUzbdXtO8+gDHVouViT +eDlFTuit4JELI2ftvHBJU0mZ+mzFHJMoVt6hoj0PH66CbRmASL8MMrkPbLXWHWkys Ds9x5Ntwgb6X+e4zGV/kNKRQwe+QNmZU8auL1K4c=
Received: from [172.25.197.158] (pcale.tana [172.25.197.158]) (AUTH: CRAM-MD5 515, TLS: TLS1.0,256bits,RSA_AES_256_CBC_SHA1) by wmail.tana.it with ESMTPSA; Mon, 02 Apr 2012 15:33:01 +0200 id 00000000005DC03F.000000004F79AA8D.0000154B
Message-ID: <4F79AA8C.8080908@tana.it>
Date: Mon, 02 Apr 2012 15:33:00 +0200
From: Alessandro Vesely <vesely@tana.it>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:11.0) Gecko/20120327 Thunderbird/11.0.1
MIME-Version: 1.0
To: Blaine Cook <romeda@gmail.com>
References: <053201cd0b5d$c08c80f0$41a582d0$@packetizer.com> <20120326150556.GC3557@mail.yitter.info> <CAA1s49V0M7N1pLua+ORxGWmsrd_yAA_KQ0Piqjg8VuWJ5=G+Lg@mail.gmail.com> <20120327084709.GB11491@mail.yitter.info> <00ac01cd0c34$cfc96f10$6f5c4d30$@packetizer.com> <CABP7RbdtMYtqgV=NepJMNintjF9hb4h6wv2ttc5bDVqE=yAvPA@mail.gmail.com> <00d201cd0c3a$b3672410$1a356c30$@packetizer.com> <CABP7Rbdcb_xTjLv+Y8brzvhuNiae0pOJKm-9qhHrQMg+xUYPVw@mail.gmail.com> <4F72F5C0.70106@tana.it> <024101cd0d30$06d70ac0$14852040$@packetizer.com> <4F744E1D.6080101@tana.it> <041d01cd0e3b$7d9d1bc0$78d75340$@packetizer.com> <4F757D47.8060704@tana.it> <04f101cd0e9f$67616f00$36244d00$@packetizer.com> <4F782DB3.7050509@tana.it> <00a301cd102e$94d61310$be823930$@packetizer.com> <CAAz=sc=j9JY0wsCzJsZjrnU3QBBm44YZXctxro9wZd6LYWo4gQ@mail.gmail.com>
In-Reply-To: <CAAz=sc=j9JY0wsCzJsZjrnU3QBBm44YZXctxro9wZd6LYWo4gQ@mail.gmail.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Cc: "apps-discuss@ietf.org" <apps-discuss@ietf.org>
Subject: Re: [apps-discuss] What auth server supplies email addresses? Was webfinger discussion
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Apr 2012 13:33:04 -0000

Hi Blaine,

On 02/Apr/12 11:52, Blaine Cook wrote:
> 
> Basically, the breakdown is this:
> 
> Discovery:
> 
> a. email (and URI, but ignore that) based: webfinger / swd
> b. for auth protocols: the proposed oauth discovery draft, the
> mechanism that browserid uses, openid 2.0's current discovery
> 
> Anonymous Claims:
> 
> I gather that the google folks and others have figured out a way to do
> the anonymous-claims (I don't know the formal cryptoterm for that)
> with OAuth, but here's my take with browserID in a nutshell:
> 
> The current BrowserID spec has a javascript API like:
> 
> navigator.id.get( [email], callback )
> 
> which will produce a JWT assertion, signed by domain(email) (or a
> trusted 3rd party), that proves that the bearer owns the email
> address.
> 
> This can be generalised, of course, to be something (theoretical) like this:

So by "(theoretical)" you mean it may be eventually specified/
implemented but currently nothing like that exist, correct?

> navigator.claim.get( claimType, [desired claim-value-or-something], callback )
> 
> for example,
> 
> navigator.claim.get( licensedToDrive, 'fr', function (claim) {
> console.log(claim) } )
>
> which would provide a JWT signed by some-random-authority that asserts
> whether or not the person sitting at the browser is allowed to drive
> in France. The client would then verify that the assertion was signed
> by the stated issuer AND that the client TRUSTS the issuer (e.g., if
> the assertion is signed by gov.uk, then most companies in the UK would
> trust the assertion, but many in the United States (or Iran) would
> not).
> 
> Does that make sense?

For that to work, the claim provider either has to be obtained from a
standardized list of claims, or can be passed as an argument by the
caller, who may get it from the user.  For example, assuming that any
EU country can issue driving licenses valid in France, you'd need the
user to tell where she got her license from.

My opaque@example.com example is similar.  Or it could have a shorter
generalization, like navigator.id.get( "@example.com", myCallback );
where the user interacts with the server to specify what kind of
address alias (opaque, official role, name+folder@, name.surname@,
etc.) she wants to be returned to the RP, assuming her server supports
such capabilities.

Would shops use any of those?

> On 1 April 2012 18:40, Paul E. Jones <paulej@packetizer.com> wrote:
>> I don't know.. I wasn't there.
>>
>> Blaine?
>>
>> Paul
>>
>>> -----Original Message-----
>>> From: apps-discuss-bounces@ietf.org [mailto:apps-discuss-bounces@ietf.org]
>>> On Behalf Of Alessandro Vesely
>>> Sent: Sunday, April 01, 2012 6:28 AM
>>> To: apps-discuss@ietf.org
>>> Subject: Re: [apps-discuss] What auth server supplies email addresses? Was
>>> webfinger discussion
>>>
>>> On 30/Mar/12 20:03, Paul E. Jones wrote:
>>> > What you describe sounds a bit like JWT:
>>> > http://openid.net/specs/draft-jones-json-web-token-07.html
>>> >
>>> > Or, it might be OpenID Connect, which uses JWT.  (What you describe is
>>> > not in OpenID 2.0.)
>>>
>>> Aha, thanks.  So JWT is how the claim is (supposed to be) transferred to
>>> the RP, correct?  I'm trying to make sense of a presentation of anonymous
>>> claims that Blaine Cook gave on last Thursday (with the drive-in-France
>>> example).  Is it not specified or implemented, yet?
>>>
>>> >> -----Original Message-----
>>> >> From: Alessandro Vesely [mailto:vesely@tana.it]
>>> >>
>>> >> I may be conflating webfinger, openid, browserid, webid, and some
>>> >> other protocols of that sort.  At any rate, it was said that a
>>> >> functionality relevant to some of those is to certify a generic
>>> >> claim, for example whether someone is legally allowed to drive a
>>> >> lorry in France.  The user would indicate the kind-of-claim (driving
>>> >> license) and a trusted certifier (the French motoring authority)
>>> >> without revealing his/her identity.  The relaying party would then
>>> >> let the user login at the certifier's site in order to eventually
>>> >> obtain the certificate.
>>> >>
>>> >> By the same logic, given that example.com should be universally
>>> >> trusted for email addresses that end with "@example.com", its server
>>> >> would be able to provide a certified, anonymous email address
>>> >> (opaque@example.com) to a shop, on behalf of a customer who wishes to
>>> >> protect his/her main address.
>>> _______________________________________________
>>> apps-discuss mailing list
>>> apps-discuss@ietf.org
>>> https://www.ietf.org/mailman/listinfo/apps-discuss
>>