W3C home > Mailing lists > Public > public-lod@w3.org > February 2010

Re: Storing PKCS#12 inside FOAF profile for FOAF+SSL

From: Nathan <nathan@webr3.org>
Date: Mon, 22 Feb 2010 14:00:20 +0000
Message-ID: <4B828DF4.7050204@webr3.org>
To: Story Henry <henry.story@bblfish.net>
CC: Melvin Carvalho <melvincarvalho@gmail.com>, Linked Data community <public-lod@w3.org>, foaf-protocols@lists.foaf-project.org
Story Henry wrote:
> On 22 Feb 2010, at 14:50, Nathan wrote:
>> Melvin Carvalho wrote:
>>> CC: foaf-protocols
>>> On 22 February 2010 14:40, Nathan <nathan@webr3.org> wrote:
>>>> Hi All,
>>>> As per the subject, I'm very tempted to store a base64 encoded versions
>>>> of my PKCS#12 certificate store file inside my FOAF profile; this way at
>>>> any point I can simply download it; decode it and pop it in whatever
>>>> client browser I want; knowing that it can only be unlocked with the
>>>> password only I know.
>>>> Thoughts, Opinions?
>> talked myself out of it; I'd leave my identity open to a brute force
>> attack to crack the password; anybody could simply download my FOAF;
>> base64_decode the pkcs#12 and then brute force it open.
> Yes, check out the foaf+ssl  protocol. It's very easy to create public key pairs, one for each browser, and it really makes sense to publish the public key there, using the cert and rsa ontologies
>    http://esw.w3.org/topic/foaf+ssl

So I can just chain up multiple public key pairs in my FOAF profile ya?

<?xml version="1.0" encoding="ISO-8859-1"?>
   .. key one
   .. key two
  .. and so on

Received on Monday, 22 February 2010 14:01:02 UTC

This archive was generated by hypermail 2.3.1 : Wednesday, 7 January 2015 15:16:03 UTC