-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Http-Signatures #11
Comments
Some more feedback from Manu on this issue: On 07/03/2014 02:58 PM, Adrian Hope-Bailie wrote: If you're missing something, I'm missing it too. It seems like a really Features that are missing from the solution that HTTP Signatures has:
I'm going to stop there, but the solution seems questionable. There's The only thing that makes it similar in any way to BitCoin is the Bitcoin is great so this must be great if it even uses a fraction of -- manu Manu Sporny (skype: msporny, twitter: manusporny, G+: +Manu Sporny) |
It does not seem to be Http-Signatures as the focus appears to be primarily on the data transported. There appears to be the presumption that you are tunnelling data (an underlying protocol) sufficiently able to handle issues related to message replay and MITM. e.g. the protocol being tunnelled includes a nonce and other protections. On the plus side it is much closer to transport independence. You can argue whether it is positive or negative to keep HTTP metadata out of the security envelope. |
Did you consider just using HTTP-Signatures:
https://web-payments.org/specs/source/http-signatures/
If you were aware of it I am interested to know why you felt it was insufficient?
The text was updated successfully, but these errors were encountered: