by jalict on 3/18/24, 2:30 PM with 14 comments
by apitman on 3/18/24, 8:29 PM
Auth can be subtle and I'm likely missing some things, but the UX appears to be essentially equivalent to OIDC, especially given the caveat at the bottom which states users might want to consent before exposing their identity to any random server.
So I'm assuming the benefit here is that the logins themselves and any actions you take are tied to your public key and not the domain you use to host your key at any given point in time? Do they talk at all about the typical issues with PKI identity, ie lost/compromised private keys?
[0]: https://codeberg.org/fediverse/fep/src/branch/main/fep/61cf/...
[1]: https://socialhub.activitypub.rocks/t/fep-61cf-the-openwebau...
by TaylorAlexander on 3/18/24, 7:31 PM
My current server has been very slow and I’ve wanted to move. I’ll wait till this is fully deployed and then give it a shot!
by evbogue on 3/18/24, 7:40 PM
by ndriscoll on 3/18/24, 5:58 PM
Unless you have key-based naming (userId@keyFingerprint), you have to rely on a server running at the domain to be the ultimate authority on legitimacy of identities anyway, right? Exchanging a single shared secret between servers seems like a much more lightweight way to do that.
For portability, couldn't userId@example.com publish a message saying that it is now (only-or-also) known as userId@othersite.com? If example.com had the private key at some point and you were moving permanently, you'd need to generate a new one anyway and need to publish a similar message, so why have the keys at all vs. the server just saying "yeah that's my user"?
by solarpunk on 3/18/24, 8:05 PM
by KTibow on 3/18/24, 10:58 PM