Hacker News new | past | comments | ask | show | jobs | submit login

this doesn't solve the issue that you're still trusting someone else with your secret (your password)

If you run your own identity provider, you are only trusting yourself with your secret.

Also, nothing about Persona requires password-based authentication -- you can use any mechanism you like to authenticate to your identity provider.




The problem I have with that is that I haven't found decent identity providers last time I checked.

Without some decent/proven implementations I'm hesitant to use it. I don't quite like using Mozilla's service (mostly not because of trust, it just feels half-assed not to go the extra mile and is considered an intermediate workaround/solution even by Mozilla, as far as I know). Without decent options to self host I guess I could implement it myself - but that's a big step.

So .. although I'm a fan of the concept, I'm still not using Persona anywhere.


Have a look at mine:

https://bitbucket.org/djc/persona-totp

It's less than 150 LOC of Python code (plus some HTML templates and a few basic tests).


Will do, thanks a lot. Since my infrastructure box is mostly python based (radicale, for example) this might fit in nicely.


Since everyone is plugging their own: here's a identity provider daemon written in Go:

https://github.com/wulczer/persona-idp

It uses my Mail Transfer Agent to identify, so I can just use me email password to log in to Persona-enabled sites, but you can easily swap it out for a different credentials checker.


That's quite cool - actually that'd be exactly what I want to host myself.

Not a fan of go (cough The stripe CTF made it again clear that go get isn't exactly what I want, ever), and don't want to build stuff on my box, but I'll certainly check it out. Thanks for chiming in!


Maybe you'll like the one I made: https://www.persowna.net/


I saw your link somewhere else in this thread.

I do like the site and I think it's a clever thing to build a service around it. But .. all of your options (well, all affordable ones, all that I even looked at for myself plus family) are hosted, right? I could use my own domain, but you'd be the endpoint?

Don't take that the wrong way, but you're not more trustworthy than the Mozilla Foundation.. :)

Please correct me if I missed something, but it seems as if you interpreted my self-hosted as 'can use your own domain name', no?


Yes, exactly. There are currently other options if you want to be completely self-hosted (and are not a large enterprise that has multiple users and wants a behind-the-firewall option). Persowna is a more featureful/(hopefully) secure option than the default bridge.


> If you run your own identity provider, you are only trusting yourself with your secret.

And the service I run the identity provider on. And the janitors they hire. And the legal jurisdiction it resides in. And the people (voters, oligarchs or dictators) who control that legal jurisdiction.

A secure log-in system does not require any secret which leaves my immediate personal control. This is not rocket science, and is not difficult.

My laptop browser should have an internal secret key; I should be able to get an account on a site with a site-specific key; I should be able to authorise a site-specific key on my desktop to access the same site. Heck, I should be able to connect from a public computer temporarily, and authorise the same usage with my phone. No passwords or long-term shared secrets required. If my laptop, phone or desktop is stolen I should be able to, with some inconvenience, kill the access for that device and only that device.

None of this is rocket science. It's all very possible, and the UI could (I think) be quite elegant. In part, I blame X.509 and the CA mafia for making it so tough: it was in their interest to have a rigid global hierarchy rather than a free-flowing ecosystem; it was in their interest to make certificate minting expensive rather than free (never mind that the root of any certificate hierarchy could still cost...); it was in their interest to tie identity and authorisation, which simply doesn't make sense.

One of these days I really do need to brush off SPKI, clean it up and try to push it as a solution. The guys who designed it thought long and hard about identity and authorisation, and they came up with some damned smart solutions.


> If you run your own identity provider, you are only trusting yourself with your secret.

Good point.

> Also, nothing about Persona requires password-based authentication -- you can use any mechanism you like to authenticate to your identity provider.

Good point. However, since noöne uses SRP or anything similar, de facto you're still sharing a secret (unless you're running your own provider).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: