-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify use of and requirement for acl:origin predicate #59
Comments
I think we should keep all authZ related issues in https://github.com/solid/authorization-and-access-control-panel , otherwise we risk having parallel conversations about the same issues. |
Indeed, this is under discussion in the authz panel. |
Thanks for this issue and discussion. Closing this issue as consensus is deemed to be captured in WAC Editor's Draft: https://solid.github.io/web-access-control-spec/ . See #acl-origin , #authorization-conformance , #web-origin-authorization . Please use https://github.com/solid/web-access-control-spec for future discussion. trustedApp is not in the ED. If need be, I suggest a new issue focusing on that. |
I looked there, but couldn't find the answer.
Noted, continuing in solid/web-access-control-spec#34 (comment) |
The semantics of the
acl:origin
predicate could be more clearly defined in the ACL vocabulary and/or in the Solid Web Access Control specification.First, the
acl:origin
mechanism was created to add security to Solid resources. The WAC spec document clearly states:The intention is to add a layer of security to resources. However, it is trivial for a web application to circumvent this feature (by taking the bearer token, which it already has access to, and passing that to either a same-origin endpoint or one with wide open CORS rules and then sending that same bearer token via a back channel with an arbitrary
Origin
header added to the request to the target resource server).This feature also has significant (negative) implications on being able to design an ACL cache, which is vitally important for any high-load, high-performance server implementation.
In this context (significant disadvantages and questionable advantages), it would be helpful to clarify whether supporting
acl:origin
is a requirement of all servers.It would also be helpful to clarify how
acl:origin
is supposed to work in an ACL document. The examples showacl:origin
being used in tandem withacl:trustedApp
, butacl:trustedApp
is not present in the ACL vocabulary.From an implementation perspective, it is unclear how one is to understand
acl:origin
in the context of otheracl:Authorization
scopes: is the intention that someacl:Authorization
s will apply to users (i.e. WebIDs) and others will separately apply toacl:origin
values? Or would those predicates be unified in a singleacl:Authorization
scope?It is possibly worth noting that the ACL vocabulary defines
acl:origin rdfs:domain acl:Authorization
.The text was updated successfully, but these errors were encountered: