[security] security

James A. Donald jamesd at echeque.com
Sat Oct 28 22:48:41 UTC 2006


     --
Martin Atkins wrote:
 > The spec that we are calling "OpenID Authentication"
 > provides a protocol for an RP to ask an IdP whether
 > some user controls a given URI.
 >
 > It specifies the use of another protocol —Yadis —as a
 > mechanism to discover a list of IdPs that will answer
 > for a given URI.
 >
 > Anything else is outside of the scope of OpenID
 > Authentication.

This reminds me of similar conversations about PKI.

The problem is not whether Openid conforms to the Openid
specification, but whether the Openid specification is
good enough for the job.

The problem that Openid, as presently specified, solves
is one person posting to a blog pretending to be another
person who posts to that blog or another blog.

The problem that operators of blogs face is spam.

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      4u86zeyPP+X4RV0dtUrfjFcfYSl6f2aIBbf4K/N2
      49+2EdGpvWdZAfJ9aAY/tLw5DSZb05U/b/6vFCIT2





More information about the security mailing list