[OpenID] FW: host-meta and "acct:"
Will Norris
will at willnorris.com
Wed Nov 4 07:10:04 UTC 2009
On Nov 1, 2009, at 10:48 AM, Peter Williams wrote:
> in the origin al XRI 2.0 draft doc, you see the rules the processor
> of the
> *original* XRD format must follow (in order to embue the signed blog
> as a
> being "SAML token" type - for "SAML-assured" name resolution amongst
> other
> purposes).
>
> Now, from what I can tell, the use of SAML markup for xrd signing had
> nothing to do with SAML as we know it now in its SSO guise: folks just
> borrowed the markup (as was proper) to fashion a method of signing
> XRDs,
> much as Microsoft applied similar markup in cardspace signaling.
>
> In doing so, folks could also borrow the semantics of the core SAML
> controls
> that go with SAML type processing. These seems to have been largely
> about
> ensuring that the resulting blob acted as a "token" - once removed
> from its
> issuing context. So, you can think of the XRI/XRD servers as an
> early forms
> of STS: a signed blob server and signed blob verifier, given the
> (naming
> and trust) contexts that the TTP-grade name-serving apparatus of
> ibrokers
> wanted to manage.
not really... SAML was only included because it had a decent profile
of XML DSig. The way it was used in XRI Resolution 2.0 meant that it
actually violated the SAML spec in several ways.
Signatures in XRD 1.0 are pretty much identical with signatures in XRI
Resolution 2.0. The only difference is that they are no longer
wrapped inside of an embedded SAML assertion. That was a pretty weird
way to do it, so we put the <ds:Signature> directly into XRD. For the
actual XML DSig profile, we actually copied the text directly from
SAML 2.0 modulo some additional feedback from SAML editors.
> Hmm. "Token", "once signed", "removed from its context". Sounds a
> bit like
> a signed host-meta - an blog XRD sitting on a file server doing what
> a HTML
> file with a few meta tags for links would also do, except it's a "bit"
> easier to parse (I suppose).
honestly don't see the connection, but okay.
> Now, the host-meta I-D implies that one can sign the elements (having
> included a subject field).
subject is absolutely not required for signing an XRD. It may be
required for certain trust models, but seeing as those haven't been
written yet, nothing can be said about them with any certainty.
> This is what I for my want to know all about - from IETF. How does
> one sign
> an host-meta profiled XRD, considering the content of the subject in
> particular. For all I know, given the evidence from XRDS-simple,
> they are
> going to have us do what sort of thing they proposed there, where
> the URI in
> the subject field will have a fragment on the end, indicating the
> xml:id
> value.
The subject has nothing directly to do with the actual signing of an
XRD document. Depending on your trust profile, the subject URI MAY
have to match something in the key material used to generate the
document signature. If the subject URI has a fragment, that has
nothing to do with the xml:id value of the <XRD> element. The only
connection the <XRD> xml:id has is with the <ds:Reference> in the
signature.
> We don't know, and we should. Evidently (given the syntax change),
> it ain't
> gonna happen the way it happened in the era of the XRI-based signed
> XRD. For
> all we know, folks may even decide that the "xml:id control" (and the
> providerId control similarly) from the "SAML-era" signed XRD are not
> even
> necessary now.
See above. The method of generating signatures really hasn't
changed... you just don't need the SAML wrapper anymore.
-will
More information about the general
mailing list