W3C home > Mailing lists > Public > public-lod@w3.org > February 2010

Re: Storing PKCS#12 inside FOAF profile for FOAF+SSL

From: Story Henry <henry.story@bblfish.net>
Date: Mon, 22 Feb 2010 14:56:28 +0100
Cc: Melvin Carvalho <melvincarvalho@gmail.com>, Linked Data community <public-lod@w3.org>, foaf-protocols@lists.foaf-project.org
Message-Id: <1754DCCD-639F-4E77-BE4C-7251E5C690F2@bblfish.net>
To: nathan@webr3.org

On 22 Feb 2010, at 14:50, Nathan wrote:

> Melvin Carvalho wrote:
>> CC: foaf-protocols
>> 
>> On 22 February 2010 14:40, Nathan <nathan@webr3.org> wrote:
>> 
>>> Hi All,
>>> 
>>> As per the subject, I'm very tempted to store a base64 encoded versions
>>> of my PKCS#12 certificate store file inside my FOAF profile; this way at
>>> any point I can simply download it; decode it and pop it in whatever
>>> client browser I want; knowing that it can only be unlocked with the
>>> password only I know.
>>> 
>>> Thoughts, Opinions?
> 
> talked myself out of it; I'd leave my identity open to a brute force
> attack to crack the password; anybody could simply download my FOAF;
> base64_decode the pkcs#12 and then brute force it open.

Yes, check out the foaf+ssl  protocol. It's very easy to create public key pairs, one for each browser, and it really makes sense to publish the public key there, using the cert and rsa ontologies
 
   http://esw.w3.org/topic/foaf+ssl

Henry

> 
Received on Monday, 22 February 2010 13:57:07 UTC

This archive was generated by hypermail 2.3.1 : Sunday, 31 March 2013 14:24:25 UTC