@filippo

I'm not sure if this is the right analogy. AP ID is a URL under which you can find metadata and public signing keys for the account. It's an in-envelope concept (to borrow e-mail terminology) and has ~nothing to do with routing (in fact the metadata returned points at your inbox, outbox, and other collections, which can be hosted wherever the handler of that URL desires).

I do agree that it's bad that we have two levels of IDs and different pieces of software consider different levels as persistent.

@robryk @filippo But that's the thing, why is the domain of the identity hard-tied to a URL host? They could have used SRV or TXT resolution mechanisms like other protocols do.

Follow

@taral @filippo Given that DNS is simple unauthenticated plaintext that would mean that anyone able to fake DNS responses to homeserver foo could provide fake messages from any remote instances that foo would believe in.

@robryk @filippo Hmm, that is a good point. Requiring the eventual endpoint respond with a certificate for the original domain would solve that but add its own complexity. Messy.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.