[OpenID] Blacklisted or 'every user'?
SitG Admin
sysadmin at shadowsinthegarden.com
Mon Jun 2 05:06:02 UTC 2008
I've been thinking about identity and trust; specifically, the
chicken-and-egg debate that relates to OpenID because it is "about
identity, not trust". It seems to me that our URI's are the
*identity*, and our OP's receive the *trust*; we have trouble
agreeing on any centralized solutions that we can all trust, but then
we each pick our own favorite centralized solution and clamor for
everyone else to join us! That doesn't work, and interoperability is
impossible *because* we don't trust anyone else's favored centralized
solution. So now (with OpenID) interoperability is being assured on
the basis of "The person trying to log in trusts their solution."
instead of "*I* trust the solution of the person trying to log in.";
we can look at how this scattering effect is potentially the complete
opposite of centralization (with the possibility of being anywhere
along a spectrum in between as popularity of multi-user OP's grows),
but I'm much more interested in what this outsourcing of trust
implies.
If identity and trust each seem to require the other, it may be due
to a feedback effect where establishing details about one will
reflect upon the other. To what extent do I accept the user's
outsourcing of trust? Am I accepting that the user trusts that OP, or
that the OP should receive *my* trust? I think (and this is just *my*
answer, and experimental) that I should trust their OP just far
enough to go through the OpenID protocols, but when it comes to my
own judgement, I may decide that - since I cannot be sure that the OP
meets my own standards for authentication - that I will blacklist the
user. But this is blacklisting the *user*, not their *OP* - once
their OP vouches for them, I say "Okay you have proven to be the one
I am blacklisting, now you know that you *are* being blacklisted."
To determine my standards for authentication I have to ask what
matters to me. In this case, that only one real person will be
accessing the site through a single OpenID Identity - so, the OP has
to be reliable for preventing all other users from logging in. This
is where it begins to generate feedback into identity; if I do not
*trust* the OP to take reasonable measures in preventing others from
logging in, I must assume that the *identity* of the user vouched for
by that OP is potentially any *other* user. At this point, to protect
the elevated privileges of the user (possibly including their
privacy, if they can access their personal details through their
account with my site!), I must downgrade their access to "every user"
instead of "this particular user".
An excellent example of this would be the server at
www.jkg.in/openid/*, which does not perform ANY authentication before
vouching for the user. Interestingly, this site allows me to offer
authentication-less "groups" with OpenID, to give people an idea for
how it works (*without* having to sign up anywhere) and let them
access particular areas of the site; for instance, a note on the
front page might say "log in as www.jkg.in/openid/press" for media
information.
Of course sometimes blacklisting is meant to apply to users, not
OP's, but I don't think we have much to worry about if blacklists
ignore OP's. It might affect users on a large scale if, say, all AOL
users were banned, but that's been done before :)
-Shade
More information about the general
mailing list