Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1WW4Ot-0006dm-Ty for bitcoin-development@lists.sourceforge.net; Fri, 04 Apr 2014 13:43:19 +0000 Received-SPF: pass (sog-mx-1.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.219.43 as permitted sender) client-ip=209.85.219.43; envelope-from=mh.in.england@gmail.com; helo=mail-oa0-f43.google.com; Received: from mail-oa0-f43.google.com ([209.85.219.43]) by sog-mx-1.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1WW4Os-00028B-W0 for bitcoin-development@lists.sourceforge.net; Fri, 04 Apr 2014 13:43:19 +0000 Received: by mail-oa0-f43.google.com with SMTP id eb12so3553672oac.30 for ; Fri, 04 Apr 2014 06:43:13 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.60.141.9 with SMTP id rk9mr19433831oeb.12.1396618993519; Fri, 04 Apr 2014 06:43:13 -0700 (PDT) Sender: mh.in.england@gmail.com Received: by 10.76.96.180 with HTTP; Fri, 4 Apr 2014 06:43:13 -0700 (PDT) In-Reply-To: References: Date: Fri, 4 Apr 2014 15:43:13 +0200 X-Google-Sender-Auth: oj_GPybGvkFTn6I29zM1BRkuWus Message-ID: From: Mike Hearn To: =?UTF-8?Q?Eric_Larchev=C3=AAque?= Content-Type: multipart/alternative; boundary=047d7b3a9cacff3d4304f637b2ad X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (mh.in.england[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1WW4Os-00028B-W0 Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] Draft BIP for seamless website authentication using Bitcoin address X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Apr 2014 13:43:20 -0000 --047d7b3a9cacff3d4304f637b2ad Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On Fri, Apr 4, 2014 at 3:22 PM, Eric Larchev=C3=AAque wr= ote: > I see only benefits for the entire ecosystem, and if I'm working on such = a > proposition it is because I really need this feature. > Why do you need it? Because you don't want to implement a login system? Very, very few websites are the sort of place where they'd want to authenticate with only a Bitcoin address. If for no other reason than they'd have no way to email you, and if you lost your wallet, you'd lose all your associated data. > Without such a standard protocol, you could never envision a pure Bitcoin > physical locker rental, or booking an hotel room via Bitcoin and opening > the door through the paying address. > In future there often won't be a simple paying address. For instance, if my coins are in a multi-sig relationship with a risk analysis service, there will be two keys for each input and an arbitrary number of inputs. So does that mean the risk analysis service gets to open my locker? Why? What if I do a shared spend/CoinJoin type tx? Now anyone who took part in the shared tx with me can get into my hotel room too? These are the kinds of problems that crop up when you mix together two different things: the act of paying, and the act of identifying yourself. You're assuming that replacing a password people can remember with a physical token (their phone) which can be stolen or lost, would be seen as an upgrade. Given a choice between two physical lockers, one of which lets me open it with a password and one of which insists on a cryptographic token, I'm going to go for the former because the chances of me losing my phone is much higher than me forgetting my password. All the tools you need already exist in the form of client certificates, with the advantage that web servers and web browsers already support them. The biggest pain point with them is backup and cross-device sync, which of course wallets suffer from too! --047d7b3a9cacff3d4304f637b2ad Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
On F= ri, Apr 4, 2014 at 3:22 PM, Eric Larchev=C3=AAque <elarch@gmail.com>= wrote:
I see only benefits fo= r the entire ecosystem, and if I'm working on such a proposition it is = because I really need this feature.

Why do you need it? Because yo= u don't want to implement a login system? Very, very few websites are t= he sort of place where they'd want to authenticate with only a Bitcoin = address. If for no other reason than they'd have no way to email you, a= nd if you lost your wallet, you'd lose all your associated data.
=C2=A0
Without such a standard = protocol, you could never envision a pure Bitcoin physical locker rental, o= r booking an hotel room via Bitcoin and opening the door through the paying= address.

In future there often won't be a= simple paying address. For instance, if my coins are in a multi-sig relati= onship with a risk analysis service, there will be two keys for each input = and an arbitrary number of inputs. So does that mean the risk analysis serv= ice gets to open my locker? Why?

What if I do a shared spend/CoinJoin type tx? Now anyon= e who took part in the shared tx with me can get into my hotel room too?

These are the kinds of problems that crop up when yo= u mix together two different things: the act of paying, and the act of iden= tifying yourself. You're assuming that replacing a password people can = remember with a physical token (their phone) which can be stolen or lost, w= ould be seen as an upgrade. Given a choice between two physical lockers, on= e of which lets me open it with a password and one of which insists on a cr= yptographic token, I'm going to go for the former because the chances o= f me losing my phone is much higher than me forgetting my password.

All the tools you need already exist in the form of cli= ent certificates, with the advantage that web servers and web browsers alre= ady support them. The biggest pain point with them is backup and cross-devi= ce sync, which of course wallets suffer from too!
--047d7b3a9cacff3d4304f637b2ad--