Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1V7leV-0000Rm-HN for bitcoin-development@lists.sourceforge.net; Fri, 09 Aug 2013 12:18:43 +0000 Received-SPF: pass (sog-mx-3.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.214.172 as permitted sender) client-ip=209.85.214.172; envelope-from=melvincarvalho@gmail.com; helo=mail-ob0-f172.google.com; Received: from mail-ob0-f172.google.com ([209.85.214.172]) by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1V7leU-0003RV-FW for bitcoin-development@lists.sourceforge.net; Fri, 09 Aug 2013 12:18:43 +0000 Received: by mail-ob0-f172.google.com with SMTP id er7so6288007obc.17 for ; Fri, 09 Aug 2013 05:18:37 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.182.199.74 with SMTP id ji10mr286298obc.69.1376050717082; Fri, 09 Aug 2013 05:18:37 -0700 (PDT) Received: by 10.76.23.9 with HTTP; Fri, 9 Aug 2013 05:18:37 -0700 (PDT) In-Reply-To: <4A46BA74-F2C2-4139-AABE-67CFE4BC4FA4@grabhive.com> References: <4A46BA74-F2C2-4139-AABE-67CFE4BC4FA4@grabhive.com> Date: Fri, 9 Aug 2013 14:18:37 +0200 Message-ID: From: Melvin Carvalho To: Wendell Content-Type: multipart/alternative; boundary=e89a8ff1c0242f57b604e382c66b X-Spam-Score: -0.6 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (melvincarvalho[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1V7leU-0003RV-FW Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] Idea for new payment protocol PKI X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Aug 2013 12:18:43 -0000 --e89a8ff1c0242f57b604e382c66b Content-Type: text/plain; charset=ISO-8859-1 On 9 August 2013 13:59, Wendell wrote: > We have been discussing something like this over here too, as well as > exploring more esoteric blockchain+signature-based "SSO" implementations as > discussed by John Light and others. > I've been using SSO for years using an X.509 private key in my browser, and my public key referenced in my home page. The unfortunate thing is that X.509 tends to use RSA, and bitcoin tends to use ECC for space reasons. Since, in its simplest form, bitcoin is a distributed ledger of public key / balance values you could imagine an enormous eco system where every key pair become a wallet with 10s of millions of users. I was thinking about an alt coin along these lines. The problem is that there's no OP_CODE for RSA and the block chain would become massive. > > One of our long-term ambitions with Hive is to provide a (mostly) > user-transparent, decentralized authentication service. It sounds like our > infrastructure could already handle a Persona implementation, and we very > much want to get behind some forward-thinking standard. So as long as the > plan _IS_ to remove said 'centralized struts' at the appropriate time, I'd > say we're interested in exploring this further. > Sounds great, would love to hear more about what you come up with! > > -wendell > > grabhive.com | twitter.com/grabhive | gpg: 6C0C9411 > > On Aug 9, 2013, at 1:43 PM, Mike Hearn wrote: > > > This is just me making notes for myself, I'm not seriously suggesting > this be implemented any time soon. > > > > Mozilla Persona is an infrastructure for web based single sign on. It > works by having email providers sign temporary certificates for their > users, whose browsers then sign server-provided challenges to prove their > email address. > > > > Because an SSO system is a classic chicken/egg setup, they run various > fallback services that allow anyone with an email address to take part. > They also integrate with the Google/Yahoo SSO systems as well. The > intention being that they do this until Persona becomes big enough to > matter, and then they can remove the centralised struts and the system > becomes transparently decentralised. > > > > In other words, they seem to do a lot of things right. > > > > Of course you can already sign payments using an X.509 cert issued to an > email address with v1 of the payment protocol, so technically no new PKI is > needed. But the benefit of leveraging Persona would be convenience - you > can get yourself a Persona cert and use it to sign in to websites with a > single click, and the user experience is smart and professional. CAs in > contrast are designed for web site admins really so the experience of > getting a cert for an email address is rather variable and more heavyweight. > > > > Unfortunately Persona does not use X.509. It uses a custom thing based > on JSON. However, under the hood it's just assertions signed by RSA keys, > so an implementation is likely to be quite easy. From the users > perspective, their wallet app would embed a browser and drive it as if it > were signing into a website, but stop after the user is signed into Persona > and a user cert has been provisioned. It can then sign payment requests > automatically. For many users, it'd be just one click, which is pretty neat. > > > ------------------------------------------------------------------------------ > Get 100% visibility into Java/.NET code with AppDynamics Lite! > It's a free troubleshooting tool designed for production. > Get down to code-level detail for bottlenecks, with <2% overhead. > Download for free and get started troubleshooting in minutes. > http://pubads.g.doubleclick.net/gampad/clk?id=48897031&iu=/4140/ostg.clktrk > _______________________________________________ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development > --e89a8ff1c0242f57b604e382c66b Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable



On 9 August 2013 13:59, Wendell <w@grabhive.com> wrote:=
We have been discussing something like this over here too, as well as explo= ring more esoteric blockchain+signature-based "SSO" implementatio= ns as discussed by John Light and others.

I've been using SSO for years using an X.509 private key in my bro= wser, and my public key referenced in my home page.

The u= nfortunate thing is that X.509 tends to use RSA, and bitcoin tends to use E= CC for space reasons.=A0 Since, in its simplest form, bitcoin is a distribu= ted ledger of public key / balance values you could imagine an enormous eco= system where every key pair become a wallet with 10s of millions of users.= =A0

I was thinking about an alt coin along these lines.=A0 The problem is t= hat there's no OP_CODE for RSA and the block chain would become massive= .
=A0

One of our long-term ambitions with Hive is to provide a (mostly) user-tran= sparent, decentralized authentication service. It sounds like our infrastru= cture could already handle a Persona implementation, and we very much want = to get behind some forward-thinking standard. So as long as the plan _IS_ t= o remove said 'centralized struts' at the appropriate time, I'd= say we're interested in exploring this further.

Sounds great, would love to hear more abou= t what you come up with!
=A0

-wendell

grabhive.com | twitter.com/grabhive | gpg: 6C0C9411

On Aug 9, 2013, at 1:43 PM, Mike Hearn wrote:

> This is just me making notes for myself, I'm not seriously suggest= ing this be implemented any time soon.
>
> Mozilla Persona is an infrastructure for web based single sign on. It = works by having email providers sign temporary certificates for their users= , whose browsers then sign server-provided challenges to prove their email = address.
>
> Because an SSO system is a classic chicken/egg setup, they run various= fallback services that allow anyone with an email address to take part. Th= ey also integrate with the Google/Yahoo SSO systems as well. The intention = being that they do this until Persona becomes big enough to matter, and the= n they can remove the centralised struts and the system becomes transparent= ly decentralised.
>
> In other words, they seem to do a lot of things right.
>
> Of course you can already sign payments using an X.509 cert issued to = an email address with v1 of the payment protocol, so technically no new PKI= is needed. But the benefit of leveraging Persona would be convenience - yo= u can get yourself a Persona cert and use it to sign in to websites with a = single click, and the user experience is smart and professional. CAs in con= trast are designed for web site admins really so the experience of getting = a cert for an email address is rather variable and more heavyweight.
>
> Unfortunately Persona does not use X.509. It uses a custom thing based= on JSON. However, under the hood it's just assertions signed by RSA ke= ys, so an implementation is likely to be quite easy. From the users perspec= tive, their wallet app would embed a browser and drive it as if it were sig= ning into a website, but stop after the user is signed into Persona and a u= ser cert has been provisioned. It can then sign payment requests automatica= lly. For many users, it'd be just one click, which is pretty neat.


--e89a8ff1c0242f57b604e382c66b--