summaryrefslogtreecommitdiff
path: root/b3/faec1aa2c88193e8234de6de057a5dbf2febf5
blob: 5a9e1a3e4f5d28aefbd4fb74170e44ad2273992b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193]
	helo=mx.sourceforge.net)
	by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <marek@palatinus.cz>) id 1WW5fy-0001Ya-HY
	for bitcoin-development@lists.sourceforge.net;
	Fri, 04 Apr 2014 15:05:02 +0000
X-ACL-Warn: 
Received: from mail-ob0-f173.google.com ([209.85.214.173])
	by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.76) id 1WW5fv-0007Gz-7y
	for bitcoin-development@lists.sourceforge.net;
	Fri, 04 Apr 2014 15:05:00 +0000
Received: by mail-ob0-f173.google.com with SMTP id gq1so3660754obb.32
	for <bitcoin-development@lists.sourceforge.net>;
	Fri, 04 Apr 2014 08:04:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
	:date:message-id:subject:to:cc:content-type;
	bh=qY/SUfT5H7pjDapazmS8azUuWVTvtIjBcynYyc1K15M=;
	b=ME42KUGl+K/v5omzrihRCzl7/aWGbHesPk3r2smPvmQF5+fcBGmVoPb4BMogY2hS7x
	eod3Go8h5CL1+YQmscOOmdh7ZY+MyyhhH3sRoud09nJTaD/SE3fqDhXqpww3Y8thBICL
	vy6ooLeG+49c2XUTQa4CqnUvfIb7UTJonYyQ6BG3r5K8nMj0omVtfvR9BN66cYQxR6eh
	DQoy4XVNGgdSsuOW6chKZ6CQVVIkP10EhS9WyXhfnkhgbf13ayo4BC7fPxrDtbE35Fo0
	5Q2c9zoBUV2E7DA+Yp0CEc8/byzAFd2Pwp7jBPNnB/89GdxjlQn8Do2BcmYJ4G+C/JxO
	keew==
X-Gm-Message-State: ALoCoQk0irst66MSgK5ivQmMruZwo29yeJQwKPhN6PLYXndlFWfkeRCGxjQ0q3cydyiF6StXqNWs
X-Received: by 10.60.54.38 with SMTP id g6mr184741oep.79.1396623415291; Fri,
	04 Apr 2014 07:56:55 -0700 (PDT)
MIME-Version: 1.0
Sender: marek@palatinus.cz
Received: by 10.60.102.9 with HTTP; Fri, 4 Apr 2014 07:56:25 -0700 (PDT)
In-Reply-To: <CA+WZAEqREDkDvmhM7AY+Ju3fkm3uOGm39Ef9+SYoEr43ybbg2Q@mail.gmail.com>
References: <CA+WZAEp3HsW5ESGUZ7YfR1MZXGC5jd+LucUt_MUP8K94Xwhuhg@mail.gmail.com>
	<CANEZrP0KVyp2Va7Wyy=t0qYkLNK9BDUaSzBfuzQss+=weLJ1Fw@mail.gmail.com>
	<CA+WZAEqYKv8T1OMCKhOJvf5FAy=WujJ=OhtsYP9aBf=4ZPNxmw@mail.gmail.com>
	<CANEZrP0DTYqobECBbw6eZqdk+-TR_2jhBtOviN08r31EQGmZHQ@mail.gmail.com>
	<CANEZrP2Z5x0_kOQ=8-BMzbmi9=D=ou=s3dgEksMA5F84BHSt9A@mail.gmail.com>
	<CA+WZAEqREDkDvmhM7AY+Ju3fkm3uOGm39Ef9+SYoEr43ybbg2Q@mail.gmail.com>
From: slush <slush@centrum.cz>
Date: Fri, 4 Apr 2014 16:56:25 +0200
X-Google-Sender-Auth: Z4o6tbtHAYWLSEcEdnGpmE64jy4
Message-ID: <CAJna-Hhz+K0iw4b8DDp5tNpQg6nJABKmu__aDbgT9M26PJ9tAg@mail.gmail.com>
To: =?ISO-8859-1?Q?Eric_Larchev=EAque?= <elarch@gmail.com>
Content-Type: multipart/alternative; boundary=089e0112cf388dc7f504f638bac4
X-Spam-Score: 1.0 (+)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
	(slush[at]centrum.cz)
	1.0 HTML_MESSAGE           BODY: HTML included in message
X-Headers-End: 1WW5fv-0007Gz-7y
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Draft BIP for seamless website
 authentication using Bitcoin address
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Fri, 04 Apr 2014 15:05:02 -0000

--089e0112cf388dc7f504f638bac4
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I'm cracking my head for many months with the idea of using TREZOR for web
auth purposes. Unfortunately I'm far from any usable solution yet.

My main comments to your BIP: Don't use bitcoin addresses directly and
don't encourage services to use this "login" for financial purposes. Mike
is right, mixing authentication and financial services is wrong. Use some
function to generate other private/public key from bitcoin's seed/private
key to not leak bitcoin-related data to website.

Cheers,
Marek


On Fri, Apr 4, 2014 at 4:42 PM, Eric Larchev=EAque <elarch@gmail.com> wrote=
:

>  The goal of writing a BIP seems to be to get lots of different wallet
>> authors to write lots of code for you - but I *am* a wallet author, and
>> I don't think that's the right way to get traction with a new scheme.
>>
>
> I started without a BIP and the feedback I got is that I should to a BIP.
> We cannot write all the code for all the wallets ; this is after all a
> communauty project.
> However we have and we will propose bounties for each wallet to support
> natively the protocol.
>
>
>> For instance the TREZOR guys would have to support your new protocol
>> otherwise if I paid my hotel bill with my TREZOR I couldn't open the doo=
r
>> when I got there! But they probably have better things to be doing right
>> now.
>>
>
> Yes you are right. But if the concept of authenticating yourself gets
> traction, they will probably do it.
>
>
>> The key difference between just generating a client certificate and usin=
g
>> a Bitcoin address is that the client certificate is something that is us=
ed
>> *specifically* for identification. It leaves no trace in the block
>> chain, so no weird privacy issues, it doesn't matter how you manage your
>> wallet, and you don't have to persuade lots of people to support your id=
ea
>> because it was already done >10 years ago and basically every browser/we=
b
>> server supports it.
>>
>
> My view on this is mainly about the UX and the fact everyone in
> Bitcoinland has a wallet.
> It's a approach leveraging this fact, with the possibility to build
> interesting apps combining address auth and the blockchain.
>
> I understand the problems related to multisig, contracts etc,
> There is no such thing as a from address in a transaction, however many
> services still take first tx as the return address.
> People will always find way of building and doing stuff (cf the message i=
n
> the blockchain debate).
>
>
>> Some reasons client certs aren't more widely used boil down to:
>>
>>    1. People like passwords. In particular they like forgetting them and
>>    then having friendly people assist them to get it back. Client certs =
can
>>    support this use case, but only if apps are checking the identity in =
them
>>    and not the key.
>>    2. The UI for managing client certs in browsers is pretty horrible.
>>    There's little incentive to improve it because of (1).
>>    3. Cross-device sync doesn't work very well. Apple are starting to
>>    tackle this with their iCloud Keychain Sync service but then of cours=
e,
>>    Apple has all your keys and you may well just sign in to things with =
your
>>    Apple account (if it were to be supported). Cross-device sync where t=
he
>>    server *doesn't* get your keys is supported by Chrome for passwords,
>>    but not client certs, because (1)
>>
>> None of the above issues have any obvious fix lurking within Bitcoin.
>>
>
> There is also the benefit of revocation with certificate and central
> authority.
>
> But, again, you already have a wallet and a Bitcoin address.
> So if you add a simple auth protocol, people will use it at no cost.
>
> Eric
>
>
>
>
>
> -------------------------------------------------------------------------=
-----
>
> _______________________________________________
> Bitcoin-development mailing list
> Bitcoin-development@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bitcoin-development
>
>

--089e0112cf388dc7f504f638bac4
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I&#39;m cracking my head for many months with the idea of =
using TREZOR for web auth purposes. Unfortunately I&#39;m far from any usab=
le solution yet.<div><br></div><div>My main comments to your BIP: Don&#39;t=
 use bitcoin addresses directly and don&#39;t encourage services to use thi=
s &quot;login&quot; for financial purposes. Mike is right, mixing authentic=
ation and financial services is wrong. Use some function to generate other =
private/public key from bitcoin&#39;s seed/private key to not leak bitcoin-=
related data to website.</div>

<div><br></div><div>Cheers,</div><div>Marek</div></div><div class=3D"gmail_=
extra"><br><br><div class=3D"gmail_quote">On Fri, Apr 4, 2014 at 4:42 PM, E=
ric Larchev=EAque <span dir=3D"ltr">&lt;<a href=3D"mailto:elarch@gmail.com"=
 target=3D"_blank">elarch@gmail.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_extra">=
<div class=3D"gmail_quote"><div class=3D""><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">

<div>The goal of writing a BIP seems to be to get lots of different wallet =
authors to write lots of code for you - but I <i>am</i>=A0a wallet author, =
and I don&#39;t think that&#39;s the right way to get traction with a new s=
cheme. </div>



</div></div></div></blockquote><div><br></div></div><div>I started without =
a BIP and the feedback I got is that I should to a BIP. We cannot write all=
 the code for all the wallets ; this is after all a communauty project.=A0<=
/div>



<div>However we have and we will propose bounties for each wallet to suppor=
t natively the protocol.</div><div class=3D""><div>=A0<br></div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex">



<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><div=
>For instance the TREZOR guys would have to support your new protocol other=
wise if I paid my hotel bill with my TREZOR I couldn&#39;t open the door wh=
en I got there! But they probably have better things to be doing right now.=
</div>



</div></div></div></blockquote><div><br></div></div><div>Yes you are right.=
 But if the concept of authenticating yourself gets traction, they will pro=
bably do it.</div><div class=3D""><div>=A0</div><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex">



<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><div=
></div><div>The key difference between just generating a client certificate=
 and using a Bitcoin address is that the client certificate is something th=
at is used <i>specifically</i>=A0for identification. It leaves no trace in =
the block chain, so no weird privacy issues, it doesn&#39;t matter how you =
manage your wallet, and you don&#39;t have to persuade lots of people to su=
pport your idea because it was already done &gt;10 years ago and basically =
every browser/web server supports it.</div>



</div></div></div></blockquote><div><br></div></div><div>My view on this is=
 mainly about the UX and the fact everyone in Bitcoinland has a wallet.</di=
v><div>It&#39;s a approach leveraging this fact, with the possibility to bu=
ild interesting apps combining address auth and the blockchain.</div>



<div><br></div><div>I understand the problems related to multisig, contract=
s etc,</div><div>There is no such thing as a from address in a transaction,=
 however many services still take first tx as the return address.</div>



<div>People will always find way of building and doing stuff (cf the messag=
e in the blockchain debate).</div><div class=3D""><div>=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex">



<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><div=
>Some reasons client certs aren&#39;t more widely used boil down to:</div><=
div><ol><li>People like passwords. In particular they like forgetting them =
and then having friendly people assist them to get it back. Client certs ca=
n support this use case, but only if apps are checking the identity in them=
 and not the key.</li>




<li>The UI for managing client certs in browsers is pretty horrible. There&=
#39;s little incentive to improve it because of (1).<br></li><li>Cross-devi=
ce sync doesn&#39;t work very well. Apple are starting to tackle this with =
their iCloud Keychain Sync service but then of course, Apple has all your k=
eys and you may well just sign in to things with your Apple account (if it =
were to be supported). Cross-device sync where the server <i>doesn&#39;t</i=
>=A0get your keys is supported by Chrome for passwords, but not client cert=
s, because (1)</li>




</ol><div>None of the above issues have any obvious fix lurking within Bitc=
oin.</div></div></div></div></div></blockquote><div><br></div></div><div>Th=
ere is also the benefit of revocation with certificate and central authorit=
y.</div>



<div><br></div><div>But, again, you already have a wallet and a Bitcoin add=
ress.</div><div>So if you add a simple auth protocol, people will use it at=
 no cost.=A0</div></div><span class=3D"HOEnZb"><font color=3D"#888888"><br>=
</font></span></div>

<span class=3D"HOEnZb"><font color=3D"#888888"><div class=3D"gmail_extra">E=
ric</div><div class=3D"gmail_extra">

<br></div><div class=3D"gmail_extra"><br></div><div class=3D"gmail_extra"><=
br></div></font></span></div>
<br>-----------------------------------------------------------------------=
-------<br>
<br>_______________________________________________<br>
Bitcoin-development mailing list<br>
<a href=3D"mailto:Bitcoin-development@lists.sourceforge.net">Bitcoin-develo=
pment@lists.sourceforge.net</a><br>
<a href=3D"https://lists.sourceforge.net/lists/listinfo/bitcoin-development=
" target=3D"_blank">https://lists.sourceforge.net/lists/listinfo/bitcoin-de=
velopment</a><br>
<br></blockquote></div><br></div>

--089e0112cf388dc7f504f638bac4--