Draft OpenID v.Next Discovery working group charter

Dave CROCKER dhc2 at dcrocker.net
Tue May 11 04:00:20 UTC 2010


Sorry, but I'm not understanding what you are describing.  I suspect you are, 
still, conflating otherwise-independent architectural layers and I'm quite sure 
you are describing a non-existent capability.

Making current designs attempt to cover unspecified hypothetical extensions is 
typically not successful in these efforts.

d/

On 5/10/2010 8:15 PM, SitG Admin wrote:
>> I think you are confusing the underlying mechanism with the top-level
>> naming issues. OpenID is the top-level mechanism. Tor is merely
>> masking the means of getting /to/ the OpenID service.
>
> *DNS* is the top-level mechanism, which OpenID (currently) utilizes as a
> first step. A hidden service running through Tor could easily be
> inaccessible through the public internet; no DNS entry, no IP address,
> not listening on any local port. (That's more than just an OpenID
> service whose means of access are "masked": it's an alternative means of
> access, period. You can't "find out" the real server behind its Tor
> address and use traditional DNS from then on; you can ONLY contact it
> through Tor, ever.)
>
> You asked about non-DNS discovery mechanisms, correct? Tor sort of uses
> DNS, but certainly isn't the traditional "public" DNS, and there are
> "real world" questions there as well. So, what sort of answer it counts
> as is up to you.
>
> -Shade
> _______________________________________________
> specs mailing list
> specs at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs
>

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net


More information about the specs mailing list