Replies: 3 comments 2 replies
-
From our meeting: |
Beta Was this translation helpful? Give feedback.
-
I did original research and gave a talk about homograph attacks at RSA 2016. This is a subject that I used to know a lot about, although it is possible that my knowledge is now stale, or that it was incomplete even back in the day. But I wanted to chime in on this, based on what I knew, because I think some increased precision is desirable. What did:web said isn't wrong, and neither is the conclusion that @2byrds recorded. However, I think we should document the reasoning more, and tweak the words in the spec slightly. Here's my (possibly incorrect) understanding:
Since no browsers are currently coded to specially render did:webs values as IRIs in their UIs, and since our algorithm for generating did:webs values requires URLs rather than IRIs as input, strings converted to did:webs values will never appear with the friendly and possibly deceptive glyphs that enable a homograph attack. Imagine that an attacker wants someone to think they're dealing with acme.com at If that were the whole story, I would say that both did:web and did:webs don't actually need the section that this PR included. However, I think it is still a worthwhile addition, because A) these DID methods can be superspreaders of a homograph attack, even though they themselves can never suffer from the virus and B) who knows whether browsers will at some future date start rendering DIDs as IRIs; C) the DID core spec might be updated to support IRIs. If you buy this reasoning, I will submit a trivial PR that changes the verbiage about "can't support unicode" to something more accurate, and that clarifies that did:webs can't embody homograph attacks but can contain URLs that enable homograph attacks in other contexts. |
Beta Was this translation helpful? Give feedback.
-
Closed per above. |
Beta Was this translation helpful? Give feedback.
-
To be compatible with
did:web
anddid-core
I added this PR to matchdid:web
. #114 fordid:webs
However, due to KERI and AIDs in general mitigating (in theory) a lot of the issues that make homograph attacks possible we could explore future versions of this spec that provide explicit canonicalization schemes for unicode domain names without losing our compatibility to
did:web
. Not sure how feasible or if everyone thought this might be in scope (probably not for this current edition of the spec we're trying to get out) but thought I'd open the discussion as a placeholder for anyone who may be interested in the future.Beta Was this translation helpful? Give feedback.
All reactions