SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
the finger protocol is back!
by Johann Barbie
at bitfinger.org
What is Finger?
● RFC 742 (December 1977)
● human-oriented status and user information
● <<finger user@server.org>>
Login Name: johba
In real Life: Johann Barbie
Shell: /bin/bash
No unread mail
What is WebFinger?
Personal Web Discovery on Email (RFC 7033):
1. Start with an email address: pithy.example@gmail.com
2. Translate it into a URL:
https://gmail.com/.well-known/webfinger?resource=acct:pithy.example@gmail.com

3. Fetch that URL and get back JSON:
{"subject": "acct:pithy.example@gmail.com",
"links":[{
"rel": "avatar",
"type": "image/jpeg",
"href": "http://www.example.com/~myname/profile.jpg"}
]}

4. Problem: domain name participation
What is WebFist?
● fallback when providers don't support WebFinger
● makes use of DKIM signatures
● send email to webfist server:
webfist = http://example.com/path/to/your-profile

●

restult: { "subject": "pithy.example@gmail.com",
"links": [{
"rel": "http://webfist.org/spec/rel",
"href": "http://example.com/my-delegation-here.json",
"properties": {
"http://webfist.org/spec/proof":
"http://webfist.org/webfist/proof/08e01fb3123de74555528daaeb2d33b513f50f88c255b91b02617c067df89a3809f0e17197b52413?decrypt=pithy.example%40gmail.com"
}}]}
What is Webfist?
●
●

Start with an email address: pithy.example@gmail.com
Translate it into a URL: http://gmail.com/.well-known/webfinger?
resource=acct:pithy.example@gmail.com

● Fetch that URL and receive a bad response
● Formulate a WebFist URL: http://webfist.org/.well-known/webfinger?
resource=acct:pithy.example@gmail.com

● Fetch the WebFist URL and get back JSON
● Follow the delegation path and fetch the real service
document
What is Fist Bump?
● Receive a verification email, verify its DKIM signature
● Use the email address to very slowly generate an AES
encryption key with scrypt; the email address is the
password
● AES128 encrypt the email using the generated key
● Save the email to storage, identified by "[scrypt(password)][hash(encrypted-email)]"

● Publish the list of recently encrypted blobs
● Find and share encrypted blobs with peer servers
Using Fist Bump
{ "subject": "acct:makingabetter@gmail.com",
"links":[{
"rel": "bitcoin",
"href": "bitcoin:19xeDDxhahx4f32WtBbPwFMWBq28rrYVoh"
}]

● enable CORS headers
● saved at: https://bitfinger.org.s3.amazonaws.com/songelee.json
● send email with content:
webfist = https://bitfinger.org.s3.amazonaws.com/songelee.json
Demo
demo time
Finish
Thank you!
@johba
37coins.com
bitfinger.org
Content for this presentation from Brett Slatkin’s blog: http://www.onebigfluke.
com/2013/06/bootstrapping-webfinger-with-webfist.html

Weitere ähnliche Inhalte

Ähnlich wie Bitfinger - Bitcoin on Webfinger, Webfist and Fist-Bump

Build javascript in private environment
Build javascript in private environmentBuild javascript in private environment
Build javascript in private environmentMingtao (Craig) Zhang
 
Hyperkitty: Updating Mailman's UI
Hyperkitty: Updating Mailman's UIHyperkitty: Updating Mailman's UI
Hyperkitty: Updating Mailman's UIMáirín Duffy
 
Type URL, Enter, and Then …
Type URL, Enter, and Then …Type URL, Enter, and Then …
Type URL, Enter, and Then …Jinglun Li
 
PGP based social network
PGP based social networkPGP based social network
PGP based social networkJosé Moreira
 
MozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMat Clayton
 
REST in peace @ IPC 2012 in Mainz
REST in peace @ IPC 2012 in MainzREST in peace @ IPC 2012 in Mainz
REST in peace @ IPC 2012 in MainzAlessandro Nadalin
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
 
Social Design - ProSEO
Social Design - ProSEOSocial Design - ProSEO
Social Design - ProSEOMat Clayton
 
Asp.Net difference faqs- 4
Asp.Net difference faqs- 4Asp.Net difference faqs- 4
Asp.Net difference faqs- 4Umar Ali
 
WordCamp Boston 2012 - Creating Content With Shortcodes
WordCamp Boston 2012 - Creating Content With ShortcodesWordCamp Boston 2012 - Creating Content With Shortcodes
WordCamp Boston 2012 - Creating Content With ShortcodesJon Bishop
 
How To Be A Hacker
How To Be A HackerHow To Be A Hacker
How To Be A HackerPaul Tarjan
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Krzysztof Kotowicz
 
Practical Performance Tips and Tricks to Make Your HTML/JavaScript Apps Faster
Practical Performance Tips and Tricks to Make Your HTML/JavaScript Apps FasterPractical Performance Tips and Tricks to Make Your HTML/JavaScript Apps Faster
Practical Performance Tips and Tricks to Make Your HTML/JavaScript Apps FasterDoris Chen
 
How to start WebGL easily?
How to start WebGL easily?How to start WebGL easily?
How to start WebGL easily?誠人 堀口
 
Bosh Links Visualization
Bosh Links VisualizationBosh Links Visualization
Bosh Links VisualizationSaman Alvi
 

Ähnlich wie Bitfinger - Bitcoin on Webfinger, Webfist and Fist-Bump (20)

Build javascript in private environment
Build javascript in private environmentBuild javascript in private environment
Build javascript in private environment
 
Hyperkitty: Updating Mailman's UI
Hyperkitty: Updating Mailman's UIHyperkitty: Updating Mailman's UI
Hyperkitty: Updating Mailman's UI
 
Type URL, Enter, and Then …
Type URL, Enter, and Then …Type URL, Enter, and Then …
Type URL, Enter, and Then …
 
PGP based social network
PGP based social networkPGP based social network
PGP based social network
 
Having fun with jabber bots
Having fun with jabber botsHaving fun with jabber bots
Having fun with jabber bots
 
MozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social Design
 
REST in peace @ IPC 2012 in Mainz
REST in peace @ IPC 2012 in MainzREST in peace @ IPC 2012 in Mainz
REST in peace @ IPC 2012 in Mainz
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
Social Design - ProSEO
Social Design - ProSEOSocial Design - ProSEO
Social Design - ProSEO
 
Asp.Net difference faqs- 4
Asp.Net difference faqs- 4Asp.Net difference faqs- 4
Asp.Net difference faqs- 4
 
WordCamp Boston 2012 - Creating Content With Shortcodes
WordCamp Boston 2012 - Creating Content With ShortcodesWordCamp Boston 2012 - Creating Content With Shortcodes
WordCamp Boston 2012 - Creating Content With Shortcodes
 
How To Be A Hacker
How To Be A HackerHow To Be A Hacker
How To Be A Hacker
 
Git ongithub
Git ongithubGit ongithub
Git ongithub
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)
 
Practical Performance Tips and Tricks to Make Your HTML/JavaScript Apps Faster
Practical Performance Tips and Tricks to Make Your HTML/JavaScript Apps FasterPractical Performance Tips and Tricks to Make Your HTML/JavaScript Apps Faster
Practical Performance Tips and Tricks to Make Your HTML/JavaScript Apps Faster
 
How to start WebGL easily?
How to start WebGL easily?How to start WebGL easily?
How to start WebGL easily?
 
Social bookmarking
Social bookmarkingSocial bookmarking
Social bookmarking
 
Social bookmarking
Social bookmarkingSocial bookmarking
Social bookmarking
 
Social bookmarking
Social bookmarkingSocial bookmarking
Social bookmarking
 
Bosh Links Visualization
Bosh Links VisualizationBosh Links Visualization
Bosh Links Visualization
 

Mehr von JohannBarbie

Mehr von JohannBarbie (6)

Bitcoin Droidcon Tunisia
Bitcoin   Droidcon TunisiaBitcoin   Droidcon Tunisia
Bitcoin Droidcon Tunisia
 
37 Coins
37 Coins37 Coins
37 Coins
 
Bitcoin Micropayment Channels
Bitcoin Micropayment ChannelsBitcoin Micropayment Channels
Bitcoin Micropayment Channels
 
Sleeping collection
Sleeping collectionSleeping collection
Sleeping collection
 
Travel map
Travel mapTravel map
Travel map
 
Travel
TravelTravel
Travel
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Bitfinger - Bitcoin on Webfinger, Webfist and Fist-Bump

  • 1. the finger protocol is back! by Johann Barbie at bitfinger.org
  • 2. What is Finger? ● RFC 742 (December 1977) ● human-oriented status and user information ● <<finger user@server.org>> Login Name: johba In real Life: Johann Barbie Shell: /bin/bash No unread mail
  • 3. What is WebFinger? Personal Web Discovery on Email (RFC 7033): 1. Start with an email address: pithy.example@gmail.com 2. Translate it into a URL: https://gmail.com/.well-known/webfinger?resource=acct:pithy.example@gmail.com 3. Fetch that URL and get back JSON: {"subject": "acct:pithy.example@gmail.com", "links":[{ "rel": "avatar", "type": "image/jpeg", "href": "http://www.example.com/~myname/profile.jpg"} ]} 4. Problem: domain name participation
  • 4. What is WebFist? ● fallback when providers don't support WebFinger ● makes use of DKIM signatures ● send email to webfist server: webfist = http://example.com/path/to/your-profile ● restult: { "subject": "pithy.example@gmail.com", "links": [{ "rel": "http://webfist.org/spec/rel", "href": "http://example.com/my-delegation-here.json", "properties": { "http://webfist.org/spec/proof": "http://webfist.org/webfist/proof/08e01fb3123de74555528daaeb2d33b513f50f88c255b91b02617c067df89a3809f0e17197b52413?decrypt=pithy.example%40gmail.com" }}]}
  • 5. What is Webfist? ● ● Start with an email address: pithy.example@gmail.com Translate it into a URL: http://gmail.com/.well-known/webfinger? resource=acct:pithy.example@gmail.com ● Fetch that URL and receive a bad response ● Formulate a WebFist URL: http://webfist.org/.well-known/webfinger? resource=acct:pithy.example@gmail.com ● Fetch the WebFist URL and get back JSON ● Follow the delegation path and fetch the real service document
  • 6. What is Fist Bump? ● Receive a verification email, verify its DKIM signature ● Use the email address to very slowly generate an AES encryption key with scrypt; the email address is the password ● AES128 encrypt the email using the generated key ● Save the email to storage, identified by "[scrypt(password)][hash(encrypted-email)]" ● Publish the list of recently encrypted blobs ● Find and share encrypted blobs with peer servers
  • 7. Using Fist Bump { "subject": "acct:makingabetter@gmail.com", "links":[{ "rel": "bitcoin", "href": "bitcoin:19xeDDxhahx4f32WtBbPwFMWBq28rrYVoh" }] ● enable CORS headers ● saved at: https://bitfinger.org.s3.amazonaws.com/songelee.json ● send email with content: webfist = https://bitfinger.org.s3.amazonaws.com/songelee.json
  • 9. Finish Thank you! @johba 37coins.com bitfinger.org Content for this presentation from Brett Slatkin’s blog: http://www.onebigfluke. com/2013/06/bootstrapping-webfinger-with-webfist.html