poztter.org

component · 0x0040 / 0x0041

Auth Zone.

The Auth Zone defines authentication trust groups. Sites declare the security level they require; users configure which keys clear that level. POZ separates how strong from which keys.

trust groups

A trust group is a set of keys, all of which must sign the authentication challenge. Group sizes are fixed by the protocol so that sites and clients can negotiate them by name:

SizeLevelExample composition
2BASICDevice + PIN
4STANDARDDevice + biometric + PIN + TOTP
8SECUREMultiple devices + biometrics + hardware tokens

A bank says: "Login requires SECURE." Your client picks a group of size 8 and signs. A blog says: "BASIC is fine." Your client picks a group of size 2. The site doesn't tell you which keys to use; you don't tell the site how you authenticate.

authentication flow

sequenceDiagram autonumber participant S as Site participant C as Client (your device) S->>C: challenge (nonce + required group size N) C->>C: select trust group of size N C->>C: collect signatures from each key C->>S: signed challenge S->>S: verify against POZ Auth Zone keys S->>S: optional: check revocation service S-->>C: authenticated
fig 01 · the site picks the strength, the user picks the keys.

revocation

Revoked keys are listed with timestamps in the Auth Zone itself. For real-time checks, a revocation_service_hash in the zone references a REVOCATION-type service in the Service Zone. Sites should check the revocation list before accepting authentication — a key revoked yesterday should not authenticate today.

Because the Master Zone's delegation to the Auth Zone splits grant and deny, a single key with high deny authority can revoke a compromised authentication key immediately, without a quorum. See delegation →

why fixed sizes

Fixed sizes (2, 4, 8) make security level a small enum rather than a number to negotiate. A site doesn't have to express "I want at least these specific assurances" in some complicated policy language. The protocol fixes the rungs of the ladder; users decide what fills each rung.

auth vs. identity

These are different. The Identity Zone says who you are (your handle on a provider). The Auth Zone says how you prove it's still you when you log in. A site might use Identity to find your account and Auth to log you in.

see also