I’m not saying it won’t happen — I’m saying a standard is unlikely what is
holding it back.

On Tue, Jan 21, 2025 at 10:33 PM Phillip Hallam-Baker <ph...@hallambaker.com>
wrote:

> Exactly the same happened with social media in general. We had interactive
> forums and blogs in 1994. Users couldn't quite work out what they were
> about.
>
> Ten years later, Facebook launched with a set of what were well worn
> features by then and took off.
>
> Timing matters a great deal. At the same time OpenID launched, a friend
> was trying to get a password management service off the ground. It crashed
> and burned; the users simply hadn't got to a sufficient level of pain yet.
> Today there are a dozen successful providers in that space.
>
> Another point to consider is that there is a very large government entity
> that is very upset about the 'centralization' of the Web. A government
> entity that is more than willing to pick fights with BigTech and the means
> to enforce its legal decisions. This would be a very opportune moment for
> certain companies to consider whether they would like to modify their
> technical approach, so they are not unnecessarily inserting themselves into
> unrelated business transactions or if they wish to press ahead and become
> that which is between the irresistible force and the immovable object.
>
>
>
>
> On Tue, Jan 21, 2025 at 4:45 PM Dick Hardt <dick.ha...@gmail.com> wrote:
>
>> Sounds alot like what OpenID was (not OpenID Connect)
>>
>> The user entered an identifier into the box and then was logged in. This
>> was when blogging was taking off, and we all thought people had some
>> identifier on the internet they would enter. Many of those were just a
>> domain name.
>>
>> According to Built With, OpenID[1] had more adoption in the top 1M sites
>> (42k) than Google Identity Platform[2] does today (35k).
>>
>> If you look at the OpenID graph, you see it spikes up, and then drops off
>> rapidly. Consensus was that people did not know what to do.
>>
>> Perhaps the world is different now -- but I don't think so. It was not a
>> lack of standards back then, and a standard is unlikely to change anything
>> now.
>>
>> /Dick
>>
>>
>>
>> [1] https://trends.builtwith.com/docinfo/OpenID
>> [2] https://trends.builtwith.com/widgets/Google-Identity-Platform
>>
>> On Tue, Jan 21, 2025 at 9:03 PM Phillip Hallam-Baker <
>> ph...@hallambaker.com> wrote:
>>
>>> The differences in the new approach as I see it are
>>>
>>> 1) The user identifier is '@' followed by their DNS address and that is
>>> the ONLY syntax used to present that identifier. No URIs, URLs, QR codes,
>>> etc. the only thing a user is required to remember and type in at a site
>>> where they want to claim their identity is their DNS handle.
>>>
>>> I am experimenting with calling the system @nywhere because this means I
>>> can prompt the user with the @ sign as the field label with 'nywhere' as
>>> text replaced as soon as they start to type. Which I think provides a
>>> really nice contextual grounding for the user. I am willing to change this
>>> but not to use https// or similar. URLs were never intended to be user
>>> facing labels.
>>>
>>> 2) The user can change their handle and preserve their account. In the
>>> ATprotocol scheme, the DNS handle is resolved to a DID which is a
>>> fingerprint of a public key that can be used as a root of trust for making
>>> claims related to the handle.
>>>
>>> Now, I have reservations about this part of the BlueSky spec and the
>>> fact that it is bound to a public key doesn't really mean anything unless
>>> the private key is held by the end user. It is a part of the spec that I
>>> want to align with end-to-end secure communications tech that put the
>>> private key under user control. But in the meantime, it DOES provide the
>>> ability to change handles and that is really important as it allows users
>>> to move from an 'at-will' handle controlled by another to a personal
>>> registration.
>>>
>>> 3) The entire system is loosely coupled. Relying sites are not required
>>> to establish any prior relationship with the authentication provider. This
>>> is obviously something a lot of folk are going to object to but the only
>>> way that an authentication system can become ubiquitous is if it is
>>> permissionless.
>>>
>>> I talked to folk about connecting my Internet Drafts comment forum up to
>>> the IETF datatracker and was told this was likely to require contracts and
>>> agreements and such. The emerging infrastructure allows me to authenticate
>>> the user regardless of who is providing their authentication without
>>> needing any prior agreement, app key or anything.
>>>
>>>
>>>
>>>
>>> On Tue, Jan 21, 2025 at 3:13 PM Warren Parad <wpa...@rhosys.ch> wrote:
>>>
>>>> I'm not really following. Maybe let's start at the end and work
>>>> ourselves backwards. As an Identity Provider today, we generate JWTs for
>>>> our users that applications can use. Users log in to applications via our
>>>> Authorization Server and get application specific JWTs. Based on your
>>>> suggestion how does the result JWT different from the one that we are
>>>> generating for the user+application today?
>>>>
>>>> On Tue, Jan 21, 2025 at 9:02 PM Phillip Hallam-Baker <
>>>> ph...@hallambaker.com> wrote:
>>>>
>>>>> On Tue, Jan 21, 2025 at 2:43 PM Warren Parad <wpa...@rhosys.ch> wrote:
>>>>>
>>>>>> The only thing lacking is a base of authentication service providers
>>>>>>> that are willing to give users control.
>>>>>>
>>>>>>
>>>>>> As someone who works for one of those "authentication service
>>>>>> providers", what exactly would we need to support that we don't already?
>>>>>>
>>>>>
>>>>> I am writing a draft. The short answer is almost nothing. But not
>>>>> nothing.
>>>>>
>>>>> The longer answer is that we need to have:
>>>>>
>>>>> 1) A detailed explanation that puts ALL the information needed to
>>>>> implement against the profile in one place. I am working on an Internet
>>>>> draft to do exactly that.
>>>>>
>>>>> 2) A discussion of how to best present the scheme as something whose
>>>>> primary purpose is as an authentication provider rather than an account
>>>>> with one social media property that can also be used elsewhere.
>>>>>
>>>>> 3) A discussion of how to use the DNS handles to enable end-to-end
>>>>> secure messaging. If Bob is reading a comment by Alice under @
>>>>> alice.example.com, that is the handle he is likely to want to use to
>>>>> message her.
>>>>>
>>>>> 4) A discussion about what else we might want a DNS handle provider to
>>>>> support. I have a prototype running that extends to supporting the IoT
>>>>> requirements raised in SETTLE.
>>>>>
>>>>> Right now, we have 'a' way to do this which is not necessarily the
>>>>> best way or the way that allows us to grow in all the ways we might want 
>>>>> in
>>>>> the future.
>>>>>
>>>>> I have a history of being able to market protocols and get them into
>>>>> widespread use. I haven't always been successful but have more successes
>>>>> than failures and I think I know what it takes to make DNS Handles widely
>>>>> used, which businesses I need to approach, etc. etc.
>>>>>
>>>>> The reason I am raising this here now, is that before I go round to
>>>>> the DNS registrars (and their affiliates) and the VPN providers and such 
>>>>> to
>>>>> say this is the thing to do, I want to make sure we have everything
>>>>> straight at a technical level so we are all on the same page.
>>>>>
>>>>>
>>>>>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to