Skip to content
This repository has been archived by the owner on Apr 13, 2022. It is now read-only.

NASCAR and Web Access Control #54

Closed
bblfish opened this issue Nov 25, 2015 · 2 comments
Closed

NASCAR and Web Access Control #54

bblfish opened this issue Nov 25, 2015 · 2 comments

Comments

@bblfish
Copy link
Member

bblfish commented Nov 25, 2015

LDP Options and HEAD can return an Allowed-Methods header. It is not clear from the specs if this shows

a. the methods the agent who is accessing the resource with the credentials he has provided can see
b. if these are the methods the agent with the most privileges can use - ie what methods the resource CAN Allow.

• If a server interprets the spec as a. then a client that does not see a method will have to wonder if it would be able to get that method were it to authenticate.
• If a server interprets the spec as b then a client that gets 401ed on trying to use a mehtod will want to find out whether it is even worth its authenticating. Will I get access if I try one of my many credentials?

This is where we then hit the NASCAR problem. Unless the client reads the WAC file it won't know what types of credentials required to be able to act on the resource. So it would have to ask the user to try out all possible ways to authenticate, and none of them may actually be the right ones. This would be

  1. very inconvenient for the user as he'd have to try logging in, in many different ways
  2. a big source of privacy leaks, as the user would have to try many different credentials before being able to authenticate, and so give away more information about himself than needed.

There was an interesting thread on the Credentials CG, about the NASCAR problem for which we actually have a very useful answer with WAC. I gave an answer that showed how we can solve the problem:

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants