#dev 2025-02-11
2025-02-11 UTC
#
Loqi Nextcloud is an open source software project for self-hosted personal web services including a file manager (an indie version of Dropbox), music, calendar (CalDAV), contacts (CardDAV), and more https://indieweb.org/Nextcloud

#
[tantek] I'd ask the folks listed in https://indieweb.org/Nextcloud#IndieWeb_Examples if they have experience with photos and nextcloud rather than conjecturing tbh

#
capjamesg[d] hugops

bterry1 joined the channel
#
carrvo snarfed, gRegor, have either of you seen some yellow text the last time you tried my site and couldn't log in?
#
carrvo I'm looking to ensure this change works before I merge: https://github.com/carrvo/mindie-client/pull/19
#
carrvo [edit] I'm looking to ensure this change works before I merge: https://github.com/carrvo/mindie-client/pull/19
Loqi__ joined the channel
#
carrvo Sorry, I mean with your domain, not the anonymous.
#
carrvo I'll have to see why it is forbidden...that is strange.
#
GWG Trying to decide what I'd put into sub if I were to consider https://github.com/indieweb/wordpress-indieauth/issues/286
#
carrvo I have been using the same value as `me` -- it becomes the value users have to add to a list (unless anonymous).
#
carrvo The authz layer I have is a custom whitelist per file.
#
carrvo aaronpk, what is the difference between `me` and `sub`? When I read the specs they seemed identical.
#
carrvo GWG, I'm not particular about what value you use. `me` is convenient and makes sense but at the end of the day I can retrieve the value you choose and use it with my authz layer regardless of your choice.
#
aaronpk `sub` is short for "subject" which is the user identifier. it is from openid connect and JWTs https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.2

grufwub joined the channel
#
carrvo GWG, I meant "...same value as `me` is convenient and makes sense..."
#
carrvo aaronpk, I thought so. Redundant semantic but different restrictions on the value.
#
carrvo Kind of makes me wonder why `me` was added...
#
carrvo Fair. Strange that it shows up in OAuth which I expect to predate both.
#
gRegor I did some experiments with https://www.oauth.com/oauth2-servers/access-tokens/client-credentials/ for an app and did get introspection set up for that, since there's a client_id and client_secret I could use for auth of the introspection

bret_ joined the channel
[Sophia_wood] joined the channel
#
carrvo I want it without registration restrictions so I decided for it to "log in as itself". This can probably be done better but it meets the spec. It seems like the wild left off the authn (or introspection altogether) for most IndieAuth implementations.
#
carrvo If we talk long term it would be cool to authenticate the server-to-server introspection request using the certificates they already have for their domain. Something like mTLS.
#
carrvo But short term I am considering breaking away from the spec and not requiring any authn on my introspection endpoint. It is just awkward right now.
#
carrvo Sorry for the rant...
#
carrvo aaronpk, my apologies then. I never bothered to look at the history and assumed that certain parts had been around for longer.
#
carrvo I am quite shocked at how much OAuth, OpenID Connect, and IndieAuth/IndieWeb stuff has only been since I graduated (2020). Especially since it seemed like OAuth + OpenID Connect is being treated like it so normative.
#
carrvo Almost as though if I were 10 years earlier I would have been trying to invent this stuff. IndieWeb++
#
carrvo gRegor, when it fails to sign in with your domain (due to the missing `sub`) does it return to the sign-in with an added message? I'm hoping it will give clarity to users trying to login.
#
carrvo I haven't had a chance to test it locally.
#
carrvo GWG++ I appreciate you considering adding the `sub`! I've gotten the vibes that IndieLogin.com, WordPress, and SelfAuth comprises >50% of the community.
jak2k, btrem, nemonical, RapidRotator, [Murray], bterry1, laker, rob32, srushe, suki, hedy, capjamesg, nnrx, roxwize, vikanezrimaya, okCiel, ancarda, athenaeryma, [Jo]1, [aciccarello]1, Loqi, eb and Guest6_ joined the channel
#
jeremycherfas D/me is discovering the difficulty of leaving the cargo cult that is his Tailwind theme in

#
jeremycherfas Grav. So much to undo and then build up again.

ttybitnik, claudinec, JadedBlueEyes, GuestZero__, GuestZero and gRegor joined the channel
#
gRegor Am I reading it correctly that this means Basic authentication with the client_id and an empty client_secret? https://github.com/carrvo/mindie-client/blob/3133e3f42094729c2100a312e7366433af6a0707/indieauth-client-php/redirect.php#L67

lockywolf, nemonical, [qubyte], Becbec and doesnm joined the channel
#
carrvo Basic auth, with client_id as the URI and client_secret as an underscore `_` (it wouldn't let it be empty). Just enough to identify who is asking.
#
carrvo I will fix the styling! Thanks for the check gRegor++
nanoflite joined the channel
#
carrvo My current understanding of current implementations is that there is either registeration or no authn (ignored).
#
carrvo Otherwise I can only point to my implementation: https://github.com/carrvo/mindie-idp/blob/7b48896bfe31c6b022b75e26594ce045b7f1e22e/mintoken/endpoint.php#L227
#
carrvo [edit] Otherwise I can only point to my implementation: https://github.com/carrvo/mindie-idp/blob/7b48896bfe31c6b022b75e26594ce045b7f1e22e/mintoken/endpoint.php#L227
#
carrvo The need for mod_oauth2 to perform introspection is largely why I have the anonymous user. One day I might write an IndieAuth specific Apache module...
#
carrvo I wish there was an alternative 😦
ttybitnik joined the channel
#
carrvo gRegor, I had a similar discussion with Zegnat here: https://github.com/Zegnat/php-mintoken/pull/15
#
carrvo [edit] gRegor, I had a similar discussion with Zegnat here: https://github.com/Zegnat/php-mintoken/pull/15
nanoflite joined the channel
#
aaronpk i'm not sure the token scanning attack is the best description of why the endpoint should require authentication, since realistically a resource server can also be used to check if a random string is a valid token. also you should be using values for tokens that are so long/random that they are virtually impossible to guess anyway. the larger issue is that the token introspection response is meant to

btrem joined the channel
#
carrvo Mine is a hybrid, indeed.
sebbu2 joined the channel
#
aaronpk that sounds like the authorization code binding part? https://datatracker.ietf.org/doc/html/rfc9449#section-10

bterry joined the channel
#
[aciccarello] Haha, I went down a rabbit hole looking at what JS indieauth libraries supported PKCE but I don't think I'll actually try to implement that anytime soon.
#
[aciccarello] I did notice that Omnibear was using a hard coded secret