Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Client can trust notifications are not forged. #16

Closed
brownhoward opened this issue Sep 24, 2021 · 2 comments
Closed

Client can trust notifications are not forged. #16

brownhoward opened this issue Sep 24, 2021 · 2 comments

Comments

@brownhoward
Copy link

It may also be worth mentioning that a client should be able to trust that the notifications it receives aren't forged.

Originally posted by @justinwb in solid/notifications-panel#3 (comment)

@csarven csarven transferred this issue from solid/notifications-panel Oct 27, 2021
@elf-pavlik
Copy link
Member

I think we should use terms publisher / subscriber since in different subscription types client / server roles will change in different parts of the sequence.

Currently, WebHook subscription type defines a way for publishers to authenticate when delivering notifications.
Proposed LDN subscription type relies on the publisher providing webid which will be used to authenticate when delivering notifications.

To my understanding subscription types following subscriber connects to the notification source pattern will rely on notification source URL being provided by the publisher in subscription response.

I think we should consider having a section shortly addressing this aspect in each subscription type.

@csarven
Copy link
Member

csarven commented Dec 13, 2022

Noting here that this requirement was already covered as part of general requirements:

Ability to sign notifications and verify it hasn't been tampered with in transit.

in solid/notifications-panel#1 (comment) (2019) towards realising some of the use cases. We can approach a concrete requirement in a separate issue when the UCR is updated and there are proposals for a solution. Closing and marking as postponed.

@csarven csarven closed this as completed Dec 13, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants