Skip to content

Conversation

@Falci
Copy link
Member

@Falci Falci commented Oct 26, 2020

This HIP describe how to authenticate a user using his/her Handshake name.

@Falci
Copy link
Member Author

Falci commented Oct 26, 2020

I'd like to request a special attention to the Exposing the public key section. It's totally arbitrary

@zfogg
Copy link

zfogg commented Oct 27, 2020

this is awesome. do none of the commonly used .well-known/ services work for this? i'm surprised there isn't an ietf rfc that implements something like this already

@Falci
Copy link
Member Author

Falci commented Oct 27, 2020

I checked the Wikipedia list and the IANA list but I didn't spot anything that could be used instead.

@Falci
Copy link
Member Author

Falci commented Oct 28, 2020

What would you prefer?

  1. web+hns://authentication/?challenge=<CHALLENGE>&callback=<CALLBACK>
  2. web+authentication://<CHALLENGE>@<CALLBACK>
  3. web+auth://<CHALLENGE>@<CALLBACK>
  4. Other?

@zfogg
Copy link

zfogg commented Oct 28, 2020

@Falci I suppose if there's nothing particularly Handshake specific about the implementation, then other projects could implement it or be compatible with it as well; no need to include "hns" in the spec unless hns is actually required for it to work and it won't work without hns, you know? so the second option looks the best to me, although the third option is most aesthetically pleasing.
i say number 2!

@brandondees
Copy link

@Falci I vote definitely not the prefix for 1, as this scheme is orthogonal to HNS. i think there is prior art that would collide with 2 and 3 so maybe some more homework is in order before committing to the protocol handler side of it. assuming there's no conflict or confusion with other schemes, web+authentication is less ambiguous. i'm not sure about the @ which already implies email addresses and could be confusing. the query string format seems like it would be conventional and flexible. again, i'd suggest digging through all the existing standards for this type of scheme first to avoid conflicting approaches or re-discovering issues that have already been figured out by other teams.

i understand that there may be nothing already on the .well-known lists, but there are definitely tons of existing auth protocols including ones with challenge-response modes, redirect callbacks, and special protocol handler schemes, many of which could probably be informative for these design choices.

@Falci Falci marked this pull request as draft January 21, 2021 15:22
@Falci
Copy link
Member Author

Falci commented Feb 8, 2021

Just to keep track: this should be merged as HIP-0003

@handshake-org handshake-org deleted a comment from Abhishek5772705 Jun 5, 2021
@handshake-org handshake-org deleted a comment from Abhishek5772705 Jun 5, 2021
@handshake-org handshake-org deleted a comment from Abhishek5772705 Jun 5, 2021
@handshake-org handshake-org deleted a comment from Abhishek5772705 Jun 5, 2021
@Falci
Copy link
Member Author

Falci commented Jun 11, 2021

Does this HIP still make sense after the handshake-org/hsd/pull/609 ?

@pinheadmz
Copy link
Member

@Falci I think so, it's different things. Users will likely want to store names on hardware wallets and name authentication may be a situation where they want to use a different set of keys, or rotate the keys more frequently, etc.

@NetOpWibby
Copy link
Contributor

NetOpWibby commented Nov 22, 2021

Is there a(n optional) way to use a hardware wallet as part of the authentication scheme?

Copy link
Contributor

@NetOpWibby NetOpWibby left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some grammar updates and removing gender.

@Falci Falci marked this pull request as ready for review February 10, 2025 13:16
@Falci
Copy link
Member Author

Falci commented Feb 10, 2025

I want to give this PR a new try. This is using DNS records now. Please, review and comment.

@Falci Falci changed the title Authentication using Handshake name Authentication using domain name Feb 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants