IIW 2006 – SEEN BY DOC SEARLS

Few know more about conferences than Doc, who has attended more than one of them: 

Kaliya HamlinMy Internet Identity Workshop pictures are up.

The event, an unconference, was one of the best conferences, prefix or no, that I've ever been to, much less been part of.

Here's Phil Windley's wrap. He also has an earlier list of inbound kudos for the conf.

Kaliya (pictured above) Hamlin, who organized the event's “open space” approach, has these reflections. Kaliya and Phil did most of the hard work of putting the conf together. I'm listed as an “organizer”, but that's an extreme exaggeration.

Kim Cameron called it a “superevent”.

Dave had nice things to report too. (Here are some more birthday pix.)

Next up: Berkman‘s Identity Mashup conference at Harvard Law School, June 19-21. (Watch the Identity Gang wiki for pointers.)

 

IIW 2006 – SEEN BY PETE ROWLEY

Pete Rowley of RedHat has nailed something about the mood at IIW.  His blog contains a number of related pieces.

I just attended the Internet Identity Workshop at the Computer History Museum in Mountain View, CA. Many others have blogged the event so I shall not repeat what has already been said. Suffice to say that there was no synergistic paradigm disruption here, oh no. There was however a 3 day discourse on what digital identity for the internet is, how we can build it, how we can move it, how to make that all happen, and in some cases how to effectively fear it.

The format of the workshop consisted of an introductory afternoon, and then, well, then there was a 2 day coffee break. The coffee break started with some serious retro-geekery as people were asked to write down (with pens, on paper) topics that they wished to discuss and to place them in a time slot on the wall for one of the 7 meeting places. From a purely tech standpoint the wall was an elegant example of a fully interactive calendar, or meeting agenda, with advanced features like undo, redo, merge and insert but without the computer – genius. I can only wonder what features Kaliya Hamlin has in store for us when she releases the much anticipated harderware, Wall 2.0. The unconference format is an interesting live study in self organizing systems, and it works.

It struck me during the course of one particular meeting that the people around the table would probably be impossible to assemble in one place, and certainly one table, in any other way. In fact due to the nature of the workshop and the people attending, there was an excellent chance that any query you might have could be satisfied by the top banana on the subject, and who would be willing to talk. Though I confess I couldn’t find anyone to tell me what to do about coffee induced shaking. You know you are in trouble when the guy fixing the coffee asks if you want your usual at a 3 day event. In keeping with the theme of discussion and interaction the entire workshop happenings are described on the wiki.

Actually, come to think of it, there was quite a bit of synergistic paradigm disruption after all.

IDENTITY'S MOST WANTED: WHERE IS THE SPAM KING?

Here's some news guaranteed to brighten your day from Jeremy Reimer at  Ars Technica:

In the seemingly never-ending war against spyware and other intrusive and harmful software, the Federal Trade Commission has struck a blow against Sanford Wallace, known as the “Spam King,” for his habit of sending mass e-mails. A judge in the District Court of New Hampshire has ruled in favor of the FTC, forcing Wallace and his company, Smartbot.net, to give up over US$4 million.

The company was charged with deceptively installing spyware without users’ consent, changing their browser settings, and barraging them with pop-up ads. The spyware also caused users’ computers to slow down and in some cases even destroyed user data. Some web sites featuring the software were incredibly deceptive, using a simple system call to open the CD drive and then displaying a message saying “If your CD-ROM drive is open…You desperately need to rid your system of spyware pop-ups immediately.” Ironically, clicking on the link to “rid your system of spyware popups” installed the harmful software.

“We got what we believe is a judgment for the full amount of disgorgement—the amount of money we believe he took in through the unfair distribution of spyware,” Rick Quarefima, the assistant director in the FTC's division of advertising practices, said in an interview.”

The FTC also won a smaller judgement of US$277,000 against Optintrade, a company headed by Jared Lansky that placed advertisements for the Smartbot.net software.

Wallace had initially put up his own defense in this case, arguing that “there is nothing we're involved with that cannot be avoided by a consumer choosing to turn off downloads on their computers or by blocking pop-ups” but ultimately abandoned this argument in the face of withering criticism. The final judgement was passed in his absence, although the FTC believes they will be able to track him down and retrieve the money, which will go to the US Treasury.

Hopefully this judgement will help curb the nefarious activities of companies like Smartbot.net. However, lawsuits against spyware companies are just one prong of the attack against malicious software. The problem can also be attacked with software, such as Microsoft's free Windows AntiSpyware program and anti-phishing technology integrated into most new web browsers, and by user education, which teaches people how to practice skeptical computing.

I brought you the arstechnica logo because my right-brain really liked the connection between their tagline and what they do.

The bit about reaching into your house and opening your CD drive is particularly creepy.  But it's also a signpost with respect to what is to come.

As our environment becomes intelligent and wired, the connection between physical and digital intrusion will become increasingly closer.  Today Wallace takes over our CD drives; his progeny will go for our windows and doors.  All, to me, more proof that a strong identity metasystem is not just a nice-to-have, but an inevitability.  Through its ubiquity and commoditization it can bring secure wireless devices to the price-point where intelligent enviroments can become reality. 

 

 

YOU MUST USE INFOCARDS OR REGISTER TO COMMENT

Sorry folks, I just can't take any more BLOGSPAM.  Uncle!  I've closed down comments to those who have not registered.  It's not hard to register if you use InfoCards (wink! wink!) but passwords work too, so please don't stop connecting with me.  It is a major source of energy for me.

I've done a little screen capture to show why I've been driven to this.  I'll post it on the weekend.  Until then, please post by registering or by writing to me at my I-name, and I hope you'll be able to relate to what I've been going through.

 

IIW 2006 WAS A SUPEREVENT

Everyone in attendance was awe-struck by the IIW 2006 that just took place in Mountainview.  It was incredible.

With Doc Searls and Phil Windely navigating at the macro-level, the amazing Identity Woman Kaliya orchestrated an “unconference” that was one of the most effective events I've ever attended.  It's clear that creating synergy out of chaos is an art that these three have mastered, and participants floated in and out of sessions that self-organized around an ongoing three-day hallway conversation – the hallway actually being the main conference room and event!  So we got to engage in all kinds of one-on-one (and few) conversations, meet new people, work out concerns and above all work on convergence.  Many people told me they felt history was being made, and I did too.

People showed amazing new demos of identity metasystem software from many different approaches and on many platforms.  People, we are achieving orbit.

Here is some of Phil Windely's report on day one, a kind of level-set for newcomers.  I'll link to more reports when I get home. 

We moved upstairs to accommodate the crowd and ended up with a lot more elbow room. Dick Hardt was the first speaker after the break. he gave a new version of his famous Identity 2.0 talk.

Dick mentions BCeID, a government identity service that forms a basis for digital identity in BC. I’ve long argued that governments have abdicated the responsibility for provide commerce supporting infrastructure online. (By “infrastructure” I mean legal frameworks more than hardware and software.) BCeID looks to be mostly about government online services, but Dick points out that he’s interested in seeing how it can be used by other places, like BC Hydro (power company).

Dick quotes Larry Wall’s dictum about Perl, “Easy things are easy and hard things are possible,” as a good basis for evaluating identity schemes. He lists a number of ideas that fall into the “hard things” category: agency, compartmentalization, notification, and granularity.

Mike Jones and the demo
Mike Jones and the demo
(click to enlarge)

Mike Jones from Microsoft was given the task of introducing the Laws of Identity and InfoCard. As a way of introducing InfoCard, Mike talks about claims and credentials in the physical world and how we use them. Mike spent a good deal of time talking about the laws. I think that was time well spent—they form a good basis for many of the conversations we want to have at IIW.

The identity metasystem concept is aimed at not inventing a new identity system, but inventing a system that can unify different identity systems. InfoCard confuses people because it seems like an identity system and has to be, in some sense, but it’s open because of the standards involved, so other identity systems can be adapted to work with it. The fact that there will be at least one open source and one commercial InfoCard system up before Microsoft releases it is testament to this.

InfoCard is an attempt to provide a simple user abstraction for digital identities that’s grounded in a physical world metaphor of credentials. The success of InfoCard is dependent on others implementing InfoCard.

Eve Maler from Sun was charged with discussing the Liberty Alliance Project. She quotes H.H. Monroe as “a little inaccuracy sometimes saves lots of explanation” by way of saying that in 20 minutes, she’s going to have to wave her hands a bit to get it all in.

About half the audience was familiar with SAML. Eve went through some high-level use cases as a way of introducing concepts and then moved into SAML and Liberty specific use cases.

DSC_0002.JPG
DSC_0002.JPG
(click to enlarge)

Drummond Reed spoke about XRIs. XRIs are a way of using a URL-like syntax, that is backwards compatible with the Web, to represent identifier authorities. On the IRC backchannel (#identity on freenode.net), someone said “isn’t an email address a URI?” when Johannes was talking and URL-based identity. XRI, as a Yadis compatible identity syntax, makes it clear that email addresses are part of URI-based identity.

So why a new addressing scheme? There are many different devices and different addressing schemes for each one. Even though each (like phone numbers and email) are controlled by a single entity, they each have a different syntax and controlling authority. A unified identifier can make managing these various addresses more convenient and add new services.

Drummond yielded some of his time to Andy Dale to speak a little about XDI. I wrote extensively about this last December when I was at the XDI workshop that Andy put on.

DSC_0004.JPG
DSC_0004.JPG
(click to enlarge)

Doc Searls got here right before the break and I asked him to redo his talk to set some things up for tomorrow. Doc brings up the Cluetrain Manifesto and how he realized over time that identity was critical to that vision. He recounts the history of “how we got here” (see Kaliya’s Map).

Moving from history, Doc starts talking about attention, intention, and marketplaces. These all get down to relationships. Doc has blogged about this at the IT Garage under the banner Starring in Your Own Constellation: Independent Identity in Networked Markets.

BOINGBOING TO THE RESCUE

Despite being reconciled to many annoying things, I still harbor palpable resentment against the abominable GE “puffer” machine in which I was assaulted last October.

So it was gratifying to have Cory Doctorow broadcast my description of the sordid experience in yesterday's BoingBoing

I really hope this vile contraption goes the way of the dodo bird, and that those who conceived it are reassigned to some task with zero human interface – soldering circuit boards for example.

I have not bought a single GE lightbulb, toaster, or refrigerator, since my experience with this abusive industrial waste.  The sight of their logo makes me change stores. 

Is there a “Worst User Interface of All Time” award for which I can nominate this thing?  Or an “Industrial Designer Least Likely to Succeed” dinner for its inventors?  Please convey my nomination – and that I've seen some bad design before, and know of what I speak.

Seeing the BoingBoing article, Carrick Mundell of mundell.org provided a corroborating report.

From Boing Boing, it seems Kim Cameron didn’t appreciate being subjected to the GE EntryScan3 at the San Francisco airport security checkpoint.

‘What’s it like? People, I really hated the GE product. It is tiny, and closes around you. I felt seriously claustrophobic. Then it shot bursts of air at me so hard it actually hurt. I had been told there would be “puffs of air”, but these were not, by any definition, puffs. “Puffs” make me think of cigar smoke. Or “Puff the magic dragon”. Puffs of wind. But these were hurricane strength blasts. Meanwhile the machine barks orders like a concentration camp commandant. Where did they get the voice? It speaks in a chilling metallic imperative borrowed from a really bad science fiction movie. In fact it was barely believable that adults would unleash this contraption on anyone.’

I have to agree. I got “puffed” on a return trip to Seattle last November and had a similar reaction to Cameron’s. The woman in the security line behind me also got puffed and we chatted a bit afterward comparing our experiences. We both thought it extremely weird. Neither one of us had the dreaded “SSSS” on our boarding passes indicating to security personel that we were suspects. Both of us had purchased our tickets well in advance. Both of us were traveling round-trip. In fact, we both looked exactly like the 30-something knowledge-worker wage-slaves that we were. Weird.

Cameron does a good job of explaining the feeling of being inside one of these things. It’s like a sci-fi gas chamber. Your thoughts trend toward, “What happens if the machine detects something? Will robotic arms shoot out and immobilize me? Will a tranquilizer gas be released? Will a trapdoor open sending me sliding down to some underground holding cell?” It’s creepy.

A lot could be done to improve the experience. But in addition to making it more “people friendly” how about adding features that might get people to want to be puffed? How about turning it into an “air shower” that blows dust, germs and microbes off your body? Maybe it could use ionization to clean your skin? This would help make air travel be less of a burden on the immune system. If we’re going to have sci-fi security systems, why shouldn’t we have sci-fi personal care systems, too?

 

NICE NEW BLOG BY PETE ROWLEY

There's an interesting new identity blog on the scene by Pete Rowley.  He's an open source kind of guy – positive too – and picked up on my recent InfoCard token tutorial:

“I have been pretty busy recently, which is why Kim Cameron managed to sneak by a tutorial and demo of InfoCard that also revealed the WordPress relying party PHP code for the LAMP stack. It includes a short demo video which walks through how InfoCard works when logging in to a site that is useful to review before actually reading the tutorial. Excellent!

“Now if I might be so bold Kim, could we have the code released under an open source license.”

Thanks, Pete.  In terms of releasing code, I truly hope the industry hasn't arrived at the point where you need licensing for a tutorial. 

The bottom line?  I put my ideas out there and invited everyone to use them in any way that would advance identity on the web.  I hope that's straightforward enough. 

Anyway, I like Pete's pragmatic and multi-sided approach.  Here's another example:

User-centric != user asserted

Johannes Ernst says “If user-centricity is really what we are after, it follows that I am my own identity provider in many circumstances, doesn’t it?” I think the answer to that is, to begin with. Digital identity for the internet is a bootstrap problem. Not much can be demanded or expected to begin with, and third party asserted claims are definitely a lot to ask right now.

However given a generally accepted system of identity claims assertion for the internet, I would expect that over time many of those claims would be expected to be backed up by a third party. For sure, some things will never require that: my favourite movie and other such trivia. But a lot of claims are generally self asserted now because they have to be, like my nationality, my employer, my professional affiliations, people I know, and many others may well naturally become third party claims about me, and expected to be.

User-centric identity does not imply user asserted identity, that is merely the initial expected state in order to garner adoption. Nothing more. I fully expect there to be higher level of trust in the identity claims asserted in the future, not merely the status quo.

  I totally agree.

 

WHAT INFOCARD IS AND ISN'T

Computer Security Alert has done a nice frontpage feature on “What InfoCard is and isn't” in its May 2006 issue.  The Alert is normally only available to members, but Robert Richardson has given me permission to let you download and reprint the PDF version, complete with sidebars – or you can read the main part of the story here: 

There’s little doubt that the Microsoft marketing engine will get itself geared up to tell the public at large what InfoCard “is,” but in the meanwhile, getting a handle on the next major security-related software introduction is remarkably difficult. It’s a slippery topic.

The place to start, however, is with the diagram below from an overview of the “Identity Metaverse” by Microsoft’s identity guru Kim Cameron.

The box at the very bottom of the diagram is you, the subject. If you go to a Web site or an application that requires you to establish that you’re authorized to use its services (where in the past you’d have been challenged for a username and password), you’ll instead be shown an interface where you can choose from what appear to be traditional “ID cards.” Simply put, that interface is InfoCard. That’s it.

Or, at least, that’s how to draw a line around it that differentiates it from everything else. Obviously, there’s more to it than that. For one thing, it’s running in a different security context than the rest of your applications on whatever operating system you happen to be running. It’s supposed to be completely cordoned off in terms of memory access and the like. Other applications (and, say, viruses that have installed themselves unbeknownst to you) can’t see memory that’s being used by the InfoCard interface.

Cameron does note that “if you get a rootkit, you’re in trouble. But Vista makes it much less likely that you’ll get one, because you almost always run in your own context (e.g. not at ‘root’ privilege). A virus caught in your user context cannot see your InfoCard screen or memory.” There are other security gains as well, Cameron notes: “InfoCard protects against keyloggers because typing of shared secrets becomes obsolete. And social engineering attacks are mitigated because Web sites no longer control the user experience. Finally, sensitive information like a credit card number is never stored on the PC, or visible to a virus running there.”

InfoCard presents your various credential possibilities to you in the form of “cards,” so not too surprisingly there’s also a mechanism for generating your own self-signed InfoCard and then issuing encrypted tokens when the card is used (in other words, there’s a tool for making yourself into an ID Provider, which Microsoft’s documents often refer to as an IP, but which we’ll call an IDP in the hopes of not creating confusion around the already overloaded “IP” acronym)—this too is part of InfoCard.

Finally, there’s a strong sense that this is what Microsoft thinks every operating system’s authentication interface should look like: an isolated page where you pick from your various ID cards. This really isn’t about Redmond wanting everything to look like a version of Windows—in fact InfoCard is trying to look a bit different than the rest of the Windows Vista operating system. Rather, it’s supposed to look different from everything else altogether, so that you the user realize you’ve entered one of those transitional moments where you may be handing over some of your personal information.

But other than these pieces, everything else in the identity management universe is something other than InfoCard. The part where the InfoCard interface talks across the network and exchanges information isn’t InfoCard, but the WS-Trust standard. The server that creates a token that attests that you’ve got authorization to use a certain service isn’t InfoCard either, but something like a certificate authority (CA) or perhaps something a little more old-fashioned like a Kerberos server. The primary thing that InfoCard does is allow you to choose which of several identities you want to use in a given situation where you’ve been challenged for ID.

The “cards” represent your various identities. The “cards,” it’s vital to note, don’t contain information about you, per se. You won’t find your name and address or your social security number stored in one of your cards. Instead, enough metadata is stored that when the appropriate moment arrives, InfoCard can communicate to the IDP to say who you’re supposed to be. The IDP will confirm this by challenging you in one way or another (doesn’t matter to InfoCard what that way is—it’s completely agnostic in this important respect—but it may very well matter to the Web site that is requesting the information).

So the IDP plays an important role in this, but as we mentioned above, may in some cases actually be you, as self-provider of a card (this is the situation you’ll find yourself in at a Web site that asks for a login name or e-mail address but otherwise doesn’t care who you are). The other player (besides you, the user of all this splendor) is the Web site that wants to know who you are in the first place. In today’s pre-InfoCard world, this site would normally challenge you for a username and password and check up on your assertion that you are in fact you on its own steam. With InfoCard, this site becomes a Relying Party (RP) and actually gets its assurance that you are you by way of the IDP.

There are early releases of InfoCard in the hands of developers, and blog reports so far make it clear that it’s pretty fragile just yet—it takes just the right combination of operating system release, Explorer browser preview and InfoCard code to make the thing work. It does work if you get it all right, but would seem that there are only a handful of non-Microsoft people in the world who’ve managed to InfoCard their way into a site (such as Cameron’s identityblog.com). As Cameron puts it, “it’s new, it’s evolving quickly, and it hasn’t stabilized yet.”

What happens bat game time

So with the various pieces in place, we can walk through the mechanics of an InfoCard transaction. We’ll talk here about going to a Web site, but clearly there are other use cases, such as internal applications that directly invoke the InfoCard interface to authenticate the user with an intranet application, perhaps built on a service-oriented architecture.

Arriving at the site

I’m an InfoCard-enabled user and I arrive at my bank, which has now implemented support for this interface. My arrival causes a page to be sent to my browser, as would always be the case. Indeed, the page my still contain all the usual paraphernalia for a traditional login.

Triggering the InfoCard process

What’s also in the HTML page that is sent to my browser, however, is an HTML OBJECT tag. The browser, which also has to be up-to-date, recognizes that this object has a “type” parameter that identifies it as an InfoCard request. It therefore triggers the InfoCard dynamic link library (DLL) module. The stage is set and the screen dims (I’m not kidding, it really does dim—another way of differentiating this process from normal computing activities as well as a way of making the process harder to spoof).

InfoCard gears up

Among the parameters passed to the DLL from the OBJECT tag are the claims about the user that need to be proven. These might be things like the user’s name, but on the other hand, the Web site may only need to know some anonymous piece of information, such as that the user is older than 21. Generally, the site should only have requested what it needs to know. The DLL compares the claim requests to the user’s InfoCards to see what claims can be met by which cards, and then displays those that can meet the request (others are visible but grayed out).

The user picks a card and is challenged

This is an important moment if you think about it. The user may use any card that meets the requirements of the Web site’s request. A user might maintain different personas with different sets of proofs for different contexts. With the selection made, the DLL contacts the IDP via WS-Trust. The IDP then does whatever it needs to do to authenticate the user. Possibly it asks for a username and password; possibly a one-time password must be used or some biometric proof supplied.

A secure token is issued and reviewed

Assuming the user successfully authenticates with the IDP (not the Web site, which is the RP in this scenario, it’s important to keep in mind), the IDP places the appropriate claims into an XML document and then uses the RP’s public key to encrypt them. This is sent not to the RP but back to the user’s InfoCard process, which displays the claims that are about to be sent so that the user can review them.

The approved claims are forwarded

If the user is comfortable with passing the information in the claims along to the Web site, they press a Submit button and the encrypted token is forwarded to the RP, which will now grant access to the user. The Web object in more detail Jumping back a step, notice that the mechanism for invoking the InfoCard interface really is pretty much as simple as it sounds. A snippet of HTML code is added to the rest of the material in the Web page, as in this example from Andy Harjanto’s Infocard Weblog.

Notice that this example shows a Web site that requires a SAML assertion for authentication. The RP may not get to dictate that I’ll provide my credentials or that I’ll provide a specific credential if there are several that meet the need, but it does get to dictate what kind of credential must be provided if it’s to be considered sufficient. Specifically, the RP can make requests concerning:  

  • The issuer;
  • The type of token that will be returned;
  • What claims must be vouched for by the token;
  • Requirements regarding the kind of proof used (symmetric, public key, etc), the size of the key used in authentication and other such details as might be required for high-security scenarios.

It’s worth underscoring that the RP only receives proofs of the specific claims it requests, not access to any kind of full profile of data about the individual. The user (or, at any rate, not the RP) gets to choose where data used for this particular user’s authentications are stored. This ability to separate authenticated claims from specific identities is potentially a huge gain for Internet privacy. This would be true even in relatively small ways: one can imagine being able to post comments at a blog site anonymously, but only after proving that one had the reputation (from actions at other sites) of never posting spam. Anonymity is preserved while the social good of keeping out bad actors is upheld.

On the other hand, we shouldn’t overstate how much may be gained in the real world—RP’s may still very well want a full complement of information, including name, address and credit card numbers, before selling you their products. And once they’ve got the information, they may well decide to store it, even insecurely.

As an aside, Microsoft has taken the interesting step of essentially not providing any kind of normal application/programming access to InfoCards. They are stored in their own little world; there is no API to access them. The effect of this is that cards don’t get deleted or modified or added without the user’s direct involvement, because these steps must be taken through the InfoCard interface.

For the InfoCard interface to be invoked, of course, there has to be some software resident on the user’s system. At present, it gets there by way of a purpose-built software file (a DLL file) that has to be expressly loaded along with Internet Explorer 7. These things will be part and parcel of Microsoft Vista, when it’s released next year, but users who stick with XP will have to download these pieces in order to use InfoCard.

Given that migration to Vista is bound to take place at a measured—perhaps even downright reluctant, depending on the vicissitudes of the market—pace, one question is whether the requirement for additional specialized software will make Web site developers reluctant to get involved. Obviously, they can use pre-existing login routines for users who don’t have InfoCard capability on their machines, but having two systems will just complicate life. Cameron says it’s not all that much more complicated, however: “We’ve taken this into account so the changes to a Web site are absolutely minimal.”

Organizations may or may not decide that dealing with InfoCard is worth the trouble—it will have to move beyond its current proof-of-concept stage before anyone can decide—but one thing organizations don’t have to do, should they opt to use InfoCard, is run Windows servers. From the “Microsoft’s Vision for an Identity Metasystem” white paper:

    Non-Microsoft applications will have the same ability to use “InfoCard” to manage their identities as Microsoft applications will. Non-Windows operating systems will be able to be full participants of the identity metasystem we are building in cooperation with the industry. Others can build an entire end-to-end implementation of the metasystem without any Microsoft software, payments to Microsoft, or usage of any Microsoft online identity service.

Just to prove that this is so, Cameron, who’s in charge of the InfoCard project, moved his identityblog.com over to non-Microsoft software (completely so: he’s running the classic, open-source LAMP stack). The blog is running on WordPress (also open source) and he’s written his own PHP scripts to handle the InfoCard login process. By Cameron’s own admission, it’s still a bit buggy and it lacks a certain degree of polish:

    Some of the user experience is still pretty “basic”. Like what happens if you click on InfoCard login and don’t have InfoCards installed. When I have some time I’ll make that take you to a page that tells you what InfoCards are, how they work, how to install them, and that sort of thing. But for now, the behavior should appeal to lovers of cryptic error messages.

So at least in theory, the Linux and Macintosh systems of the world could implement compatible identity selectors, RPs and IDPs that were all compatible with InfoCard. And, really, it’s only that it’s Microsoft doing the developing that makes it seem like InfoCard is the driving force here. In point of fact, InfoCard’s mission is to work with WS-Trust, an open standard (we could quibble about how open it is, but at least there’s nothing preventing anyone from using it). So the open standards for identity, such as WS-Trust, are really the driving force behind InfoCard. In any case, identity management seems to be entering something of a 2.0 phase, and there’s no question that InfoCard will play a significant role in whatever that turns out to be. — R.R.

METRICCON 1.0 – CALL FOR PARTICIPATION

This sounds like the best thing since sliced bread:

Ever feel like Chicken Little? Wonder if letter grades, color codes, and/or duct tape are even a tiny bit useful? Cringe at the subjectivity applied to security in every manner?

If so, MetriCon 1.0 may be your antidote to change security from an artistic “matter of opinion” into an objective, quantifiable science. The time for adjectives and adverbs has gone; the time for numbers has come.

MetriCon 1.0 is intended as a forum for lively, practical discussion in the area of security metrics. It is a forum for quantifiable approaches and results to problems afflicting information security today, with a bias towards practical, specific implementations. Topics and presentations will be selected for their potential to stimulate discussion in the Workshop.

Workshop Format

MetriCon 1.0 will be a one-day event, Tuesday, August 1, 2006, co-located with the 15th USENIX Security Symposium in Vancouver, B.C., Canada. Beginning first thing in the morning, with meals taken in the meeting room, and extending into the evening.

Attendance will be by invitation and limited to 50 participants. All participants will be expected to “come with opinions” and be willing to address the group in some fashion, formally or not. Preference giventothe authors of position papers/presentations who have actual work in progress.

Each presenter will have 10-15 minutes to present his or her idea, followed by 15-20 minutes of discussion with the workshop participants. Panels may be convened to present different approaches to related topics, and will be steered by what sorts of proposals come in in response to this Call.

Goals and Topics

The goal of the workshop is to stimulate discussion of and thinking about security metrics and to do so in ways that lead to realistic, early results of lasting value. Potential attendees are invited to submit position papers to be shared with all. Such position papers are expected to address security metrics in one of the following categories:

– Benchmarking
– Empirical Studies
– Metrics Definitions
– Financial Planning
– Security/Risk Modeling
– Visualization

Practical implementations, real world case studies, and detailed models will be preferred over broader models or general ideas.

How to Participate

Submit a short position paper or description of work done/ongoing. Your submission must be no longer than five(5) paragraphs or presentation slides. Author names and affiliations should appear first in/on the submission. Submissions may be in PDF, PowerPoint, HTML, or plaintext email and must be submitted to MetriCon AT securitymetrics.org.

Presenters will be notified of acceptance by June 15, 2006 and expected to provide materials for distribution by July 15, 2006. All slides and position papers will be made available to participants at the workshop. No formal proceedings are intended.

Location

MetriCon 1.0 will be co-located with the 15th USENIX Security Symposium (Security ’06).
Cost

$200 all-inclusive ofmeeting space, materials preparation, and meals for the day.

Important Dates

Requests to participate: by May 15, 2006
Notification of acceptance: by June 15, 2006
Materials for distribution: by July 15, 2006

Workship Organizers

Andrew Jaquith, Yankee Group, Chair
Adam Shostack, emergentchaos.org
Gunnar Peterson, Arctec Group
Elizabeth Nichols, ClearPoint Metrics
Pete Lindstrom, Spire Security
Dan Geer,Verdasys

Funny, I was just at a conference today arguing that the truth is in the quantitative studies.  There are some wonderful people putting this together – it seems full of promise.
 

ADAM ON DEMYSTIFYING INFOCARDS

Adam at Emergent Chaos has taken a stab at demystifying InfoCards:

For every product, there are thousands of sentences which result in the reply “well, why didn't you just say that?” The answer, of course, is that there are thousands, and often its not clear which is the right one. For me, the useful sentence is that ‘Infocard is software that packages up identity assertions, gets them signed by a identity authority and sends them off to a relying party in an XML format. The identity authority can be itself, and the XML is SAML, or an extension thereof, and the XML is signed and encrypted.’

Hmmm.  Thanks Adam.  No cigar, but we're getting closer.

Actually, the relying party states what assertions it wants, the Identity Selector allows the user to control what identity provider to use, and the identity provider packages up the identity assertions, signs them and sends them to the relying party in a token format.  The identity authority can be something local to the identity selector, or something reachable over the internet, and the token format can be XML, including SAML, or anything else.  The whole visual metaphor and user experience is called InfoCard, the protocols are WS-Trust, and the mesh of interoperating parties and technologies are the Identity Metasystem.

It feels like together we have put together a pretty good definition.  Comments?

Why didn't you just say that? (Actually, Kim Cameron says just about that in the video linked to in “The Infocards For PHP Tutorial.”)

True.  Why didn't I just say that?

More seriously, I'm unsure if Infocard is the software, the protocol, or some combination thereof. But I do have a much better understanding of how it works, so I'm glad to have watched the short movie demo.

Yes, I've been sloppy about all of this, and the fact that InfoCard is just a code name doesn't help either.  Anyway, InfoCard is really the visualization and experience that represents an identity within an identity selector. 

A couple of thoughts:

  • First, Stephan Brands of Credentica has comprehensively analyzed the privacy issues in this sort of scheme in his book, “Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy.” The essential point to be aware of is that the certifying authority can track every site you visit. Infocard includes a self-signing authority, so you're aware of every site you visit. If web sites start demanding certificates from other organizations, they have a deep view into your web activities.

See my comments below…

  • The demo code relies on Javascript. Is there anything other than the “onClick” that requires it? Javascript dramatically expands the browser's attack surface, helps phishers confuse users, etc. It would be good for Infocard to work without relying on it.

I need to think more about this.

  • Finally, there's a card which is greyed out, which Kim helpfully explains is greyed out because it doesn't include an email address. I'm expecting there's an easy way for the user to discover this?

Anyway, I'm glad that Kim produced the video, and if you've been like me, watching and not having time to dig in, go watch it.

I'm happy the video is helping clarify things.  InfoCards are really easy to use, but hard to explain to a technical audience.

No tracking 

I have to correct Adam's assertion that “the certifying authority can track every site you visit”.

The InfoCard system supports what we call “non-auditing” identity providers. As I say in the tutorial accompanying the video:

The InfoCard system supports two classes of Identity Provider.

  • “auditing” identity providers know what Relying Party the subject is visiting. They therefore encrypt directly to the relying party.
  • “non-auditing” identity providers, are not, for privacy reasons, told the identity of the relying party. Therefore, they can't encrypt for it. Instead, they send the token to the InfoCard client, which in turn encrypts it for the Relying Party.
  • Non-auding identity providers don't have visibility into the sites you visit.

    Stephan's work – which I would like to see incorporated into the InfoCard framework – adds a proof-key to the bearer semantics currently used for non-auditing providers. This strengthens the proof of ownership of the token and is a good thing, but it doesn't affect the privacy of the system.