Repository: https://github.com/solid/specification - Technical Reports: https://solidproject.org/TR/ - Code of Conduct: https://github.com/solid/specification#code-of-conduct
{
"@context": "https://www.w3.org/ns/activitystreams",
"type": "Travel",
"summary": "Sally went to work",
"actor": {
"type": "Person",
"name": "Sally"
},
"target": {
"type": "Place",
"name": "Work"
}
}
We are still polishing details. I see it in the following way:
In that case Authorization Server associated with Resource Server (RS would advertise it via as_uri
in WWW-Authenticate
would be the exclusive party to create ACRs/ACLs/...
This doesn't require anything like acl:Control
access mode at all, the association between AS and RS is pre-established.
With this approach, Access Consents would be the single source of truth, Access Grants are derived from those by AA, and ACRs/ACLs/... are derived from Data Grants by corresponding Authorization Servers.
Introducing another source of truth can lead to various issues, policies set directly in ACRs/ACLs could be easily overwritten.
I think we could have different approaches coexisting but preferably in different storages, solid/specification#377 could possibly address it as well, where one storage type would be AS managed and another could allow raw ACP/WAC/YouNameIt policies.
We have been diving into that during Wednesday AuthZ calls and I expect we will continue working things out during next weeks.
Feb 15 20:04:36 make trinity[842703]: 103.203.57.25 - [15/Feb/2022:20:04:36 +00:00] "GET 5.161.48.158:/ HTTP/1.1" 200 2528 "-" "HTTP Banner Detection (https://security.ipip.net)"
Feb 15 20:03:17 make trinity[842703]: 45.146.165.37 - [15/Feb/2022:20:03:17 +00:00] "POST 5.161.48.158:/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh HTTP/1.1" 404 683 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
Those are cute... I see lots and lots of them impinging on my servers too. That's why I think it is important to have a processing step ahead of anything heavy that can reject stuff like thatFeb 15 20:03:17 make trinity[842703]: 45.146.165.37 - [15/Feb/2022:20:03:17 +00:00] "POST 5.161.48.158:/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh HTTP/1.1" 404 683 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
(defmethod reject-ip-request ()
(when *request*
(let ((server (request-server-name *request*))
(path (request-uri *request*)))
(when (or (not (stringp server))
(not (stringp path))
(and (?ip-address server)(not (string= path "/"))))
(throw-code 404)))))
It'd be great to keep current panels at the same time slot. I'd suggest 14:00 UTC... Keeping the following in mind:
Operating principle for effective participation is to allow access across disabilities, across country borders, and across time. Feedback on tooling and meeting timing is welcome.