On Wed, Oct 17, 2012 at 8:10 PM, Tim Niblett <
t...@timniblett.net> wrote:
> Jeff,
>
> Thanks for the thoughtful reply. I take your point about putting
> questions/bugs to the right place. Couple of questions if you have time.
>
> You say that OAuth isn't about identity. But this is a pig with
> lipstick. Google and Facebook _are_ using it for identity. So are you
> on Voost.
It is important to distinguish between the authentication protocol and
its notion of identity. Persona is a protocol which uses email
address as an identity. OpenID is a protocol which uses a URL as an
identity. Facebook uses OAuth but your Facebook account
(specifically, your facebook id) is the identity.
Email address (Persona) and URL (OpenID) are both distributed
identities, which is far better for weaving the fabric of the internet
than the siloed and rigidly controlled identities like Facebook and
Twitter. OpenID came out of the blog community, where it made sense
that the URL to your blog is "you"; however, this confuses and
bewilders the vast majority of the world.
> My question about 2-factor was about the UI. Is this expected to
> happen in the popup, or will users get directed to a Google URL? With
> OAuth the UI is in Google's control. I don't understand what happens
> with Persona.
I don't know what will happen with BigTent; that's still under
development. Hopefully it will have the same UX as if Google was a
primary IdP. You can try it yourself using
http://eyedee.me (an IdP)
and
http://123done.org (or, for that matter, Voost).
> The weird address is that _an_ address not belonging to the site
> you're logging in to is shown anyway. Perhaps 1 user in 100 will look and
> say "**** I'm being spoofed, that's not the correct Persona
> URL. Another confusing (potentially) issue is that with Mozilla as the
> IdP I can use an arbitrary password with a GMail address (which I
> am). Probably most people give the "real" password.
If you're entering in your password for the Persona secondary IdP,
then yes, you will type your password in when the URL bar says
login.persona.org. Is that confusing? Not particularly. But if your
primary IdP is Google or Yahoo or whatnot, then the url bar will say
google.com or
yahoo.com or whatnot. The secondary IdP is just a
bootstrapping process, and when BigTent is in place, few will see even
that.
At any rate, having
persona.org in the url bar is not any more
confusing than any other kind of federated login system - there will
always be something else in the URL bar. If you're making the
argument that all websites should maintain their own separate password
databases and web forms... well, it's pretty clear why that has been
failing us, but if you want to open that debate, I'm game :)
> I don't understand your comment about Persona being particular about a
> shared machine. My point was that its not particular from what I've seen.
> Do
> you mean its a bug? Or that sharing a browser from the same (host pc)
> account means its my fault for being dumb?
Maybe I'm misunderstanding you. If you choose to have a browser
"remember me" on a website, you're going to be in potential trouble if
someone else sits down at your workstation. I'm not sure what is new
about Persona here.
> What I should have said about hack attempts is another UI issue. What
> does the IdP do if it wants to tell the user in the browser that
> they've had too many login attempts for example?
Exactly what they do now. If you try to log in too many times to
federated Google Auth, it'll lock you out. This has nothing to do
with Persona, which doesn't specify the UX of identity providers.
Take a look at
http://eyedee.me/, it can be taht simple. Persona just
defines the federation logic so that you can log in to other sites
_after_ you have authenticated at an IdP.
> Also will Mozilla alert
> people
> to suspicious activity on their account by Email when they act as IdP?
I doubt it, but you could always request the feature. Keep in mind
that the Mozilla secondary identity provider is just a bootstrapping
tool and will hopefully disappear some day. If I set up an IdP at
infohazard.org, I can stop worrying about it entirely.
> As I said at the beginning I like Persona. I think I'd be happy with
> it for a non-particularly-secure app. Certainly happier than Google
> OAuth which seems lax with cookies ( I could have got it wrong but
> it seems not to cancel cookies when you revoke a token). Perhaps
> I should amend my initial comment to "I haven't been able to determine
> to my satisfaction whether Persona is ready for prime time".
I think anywhere you would consider Facebook authentication is a
pretty good place to consider Persona authentication. I wouldn't
expect to see banks using it anytime soon, but banks are always a
decade behind the technology curve so that is not surprising.
I don't think Persona in principle opens up any new avenues of attack.
Sure, right now there is the secondary auth system, but that will
disappear at some point along with the javascript shim (Persona is
being built into browsers). Email is already the "master key" for
pretty much every website that takes username/password thanks to
password recovery. So why wouldn't you consider Persona secure?
Other than it's relatively new... it could have bugs, sure.
> As a matter of interest what split do you get on Voost between
> Facebook and Persona logins? I'd guess perhaps 85/15?
Our audience is about 50-50. That's before hordes of lookie-loos came
to check out Persona - we're linked from Mozilla's announcement (we
don't mind, but it definitely slants the statistics). Our audience
tends to be an older crowd, many of whom either do not have or
actively do not like Facebook. If you're hitting primarily college
kids, the numbers will likely be different. If you're hitting geeks,
I would expect a lot more Persona.
Jeff