Re: [OpenID] FW: PROPOSAL: An Extension to transform an EMail Address to an OpenId URL

2007-02-09 Thread Robert Yates
On 2/9/07, David Fuelling <[EMAIL PROTECTED]> wrote:

 > I appreciate any and all feedback!

For what it's worth I think that this is excellent. A couple of suggestions:

1) You probably should take a look at the URI Template spec [1].
These guys have done a lot of the work for you. The spec is still in
active development and has been blogged about by the author [2], I
think that they are about to release a new version with some updates.

2) Why map the e-mail address to an openid url, which then has to be
further resolved to a Yadis document?  Why not, instead, map straight
to a yadis doc and make e-mails full fledged openids.  An openid is
nothing more than a URI that can be resolved to a Yadis doc.
mailto:[EMAIL PROTECTED] is a perfectly valid URI and you have
demonstrated a pretty simple way to map it to a yadis doc.

Rob

[1]http://www.ietf.org/internet-drafts/draft-gregorio-uritemplate-00.txt
[2]http://bitworking.org/news/URI_Templates
___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


attribute exchange draft 4 review

2007-02-09 Thread Johnny Bufu
Hello list!

While reviewing our AX implementation, I came across a case where the  
spec is not clear enough:

openid.ax.required
The value of this parameter is an attribute alias, or a list
of aliases corresponding to the URIs defined by
"openid.ax.type." parameters. The OpenID Provider
MUST provide the identity information specified in this
parameter or return an error condition.

The error condition that the OP is supposed to return is not fully  
specified. We mention in the overview section that standard OpenID  
error messages should be used, but those would indicate a core /  
authentication failure.

My question is how would you, as an implementer on the RP side,  
prefer to be notified that the user / OP were not willing / able to  
supply a required attribute?


Thanks,
Johnny
___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


Re: Proposal: An anti-phishing compromise

2007-02-09 Thread Dick Hardt
I chatted with Avery about this today.

URIs for specific auth methods as well as ones for general seems to  
be the flexible approach.

Per Kim's laws, the method of auth may not be needed, so is extra  
disclosure


On 8-Feb-07, at 11:38 PM, Recordon, David wrote:

> Maybe laws are meant to be broken.  I don't see why a RP knowing  
> that I
> used a token as a second factor is a bad thing.  If nothing else, the
> technology should support the OP providing that information and the  
> OP's
> implementation can let me as the user decide if I want to.  Just like
> the trust request, it isn't mandated by the spec but every  
> worthwhile OP
> does it.
>
> My $0.02.
>
> --David
>
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
> Behalf Of Dick Hardt
> Sent: Sunday, February 04, 2007 11:42 PM
> To: Granqvist, Hans
> Cc: OpenID specs list
> Subject: Re: Proposal: An anti-phishing compromise
>
>
> On 1-Feb-07, at 2:36 PM, Granqvist, Hans wrote:
>>> Add a single, required, boolean field to the authentication response
>>> that specifies whether or not the method the OP used to authenticate
>>> the user is phishable. The specification will have to provide
>>> guidelines on what properties an authentication mechanism needs to
>>> have in order to be "non-phishable." The field is just meant to
>>> indicate that the authentication mechanism that was used is not a
>>> standard "secret entered into a Web form."
>>
>> The receiver should decide what is 'non-phishable', not the  
>> sender, so
>
>> it would be better if the OP just states what mechanism was used,
>> perhaps.
>
> Per Kim's laws, how I authenticate to my OP is none of the RP's
> business.
> That I authenticated in a phishing resistant manner is.
>
> ie. we want the OP to make the statement that it followed certain
> anti-phishing guidelines.
>
> There is no certainty that the OP followed them, but the RP and user
> have recourse against an OP if the OP stated that it did follow the
> anti-phishing guidelines.
>
> -- Dick
> ___
> specs mailing list
> specs@openid.net
> http://openid.net/mailman/listinfo/specs
>
>

___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


Re: Proposal: An anti-phishing compromise

2007-02-09 Thread Martin Atkins
Recordon, David wrote:
> I agree that things like age should be in an extension, though I think
> this single piece of data is useful in the core protocol.  I'm sure the
> exact definition of phishing resistant will come back to bite us in
> sometime in the future, but lets deal with it then instead of not adding
> anything now.  I really like the idea that there be one thing in the
> core spec which reaches out to each extension.
> 

I propose:

openid.make_it_work=1


___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs