W3C home > Mailing lists > Public > public-webid@w3.org > June 2017

Re: Verifying WebID fails

From: Kingsley Idehen <kidehen@openlinksw.com>
Date: Wed, 28 Jun 2017 10:16:36 -0400
To: Martynas Jusevičius <martynas@atomgraph.com>, public-webid@w3.org
Message-ID: <e0f89842-9619-22f6-3db2-3571ec0c223f@openlinksw.com>
On 6/27/17 8:44 PM, Martynas Jusevičius wrote:
> Kingsley,
>
> I am implementint WebID authentication in our software, and key
> mismatch is a real scenario.
>
> Can you show me where in the spec it is addressed?

Martynas,

Your comments are confusing. 

Are you speaking of the WebID+TLS protocol which is basically a
TLS-handshake extension that uses a WebID lookup (using value of SAN
attribute in an X.509 Cert)  to locate a Public Key in a WebID-Profile
document? If not, then we are not speaking about the same thing, and as
a result not communicating effectively.

Terms:

1. WebID -- HTTP URI that identifies an Agent and adheres to Linked Data
principles
2. WebID-Profile Document -- a collection of RDF statements in an RDF
document that describe an Agent identified by a WebID
3. WebID+TLS -- TLS handshake extension that matches Public Keys in an
X.509 cert and a WebID-Profile document by way of WebID de-reference
4. WebID+TLS+Delegation -- adds an additional lookup route to #3 via
acl:delegates relation

Kingsley
>
> On Wed, 28 Jun 2017 at 02.04, Kingsley Idehen <kidehen@openlinksw.com
> <mailto:kidehen@openlinksw.com>> wrote:
>
>     On 6/27/17 6:33 PM, Martynas Jusevičius wrote:
>     > Hi,
>     >
>     > I think there is another case where failure scenario is not
>     defined in
>     > protocol: verifying the WebID.
>     >
>     > What happens if the certificate key does not match the WebID
>     key? None
>     > of the verification steps or sections seem to consider that. I
>     suggest
>     > again that a 400 Bad Request should be returned.
>     >
>     > I think it is important for the protocol to handle failures if
>     we want
>     > robust implementations.
>     >
>     > Is this group active enough to fix such issues?
>     >
>     >
>     > Martynas
>
>
>     Hi Martynas,
>
>     What do you mean by Certificate Key? Are you referring to the
>     Public Key
>     component of an X.509 Certificate?
>
>     Bearing in mind that WebID+TLS isn't new, are there are
>     implementations
>     out in the wild, wouldn't it be better if you started off by testing
>     authentication of your WebID against existing implementations?
>
>     You might also find the YouID browser extension we built interesting
>     since its sole purpose is simplification of WebID+TLS and/or
>     WebID+TLS+Delegation protocol usage (e.g., negating the UX headache
>     introduced by browsers when toggling WebIDs over and existing TLS
>     session) [1].
>
>     You can try:
>
>     [1] http://linkeddata.uriburner.com/sparql -- click on "login" button
>
>     [2] http://osdb.openlinksw.com -- click on the "login" button
>
>     [3] http://id.myopenlink.net/ods/webid_demo.html -- most basic
>     WebID+TLS
>     authentication tool we have
>
>     Links:
>
>     [1]
>     https://medium.com/openlink-software-blog/simple-youid-browser-extension-usage-exercise-57fa3ff6c6b7
>     -- Simple YouID Browser Extension Usage Exercise.
>
>     --
>     Regards,
>
>     Kingsley Idehen
>     Founder & CEO
>     OpenLink Software   (Home Page: http://www.openlinksw.com)
>
>     Weblogs (Blogs):
>     Legacy Blog: http://www.openlinksw.com/blog/~kidehen/
>     <http://www.openlinksw.com/blog/%7Ekidehen/>
>     Blogspot Blog: http://kidehen.blogspot.com
>     Medium Blog: https://medium.com/@kidehen
>
>     Profile Pages:
>     Pinterest: https://www.pinterest.com/kidehen/
>     Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen
>     Twitter: https://twitter.com/kidehen
>     Google+: https://plus.google.com/+KingsleyIdehen/about
>     LinkedIn: http://www.linkedin.com/in/kidehen
>
>     Web Identities (WebID):
>     Personal: http://kingsley.idehen.net/dataspace/person/kidehen#this
>             :
>     http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this
>
>

-- 
Regards,

Kingsley Idehen	      
Founder & CEO 
OpenLink Software   (Home Page: http://www.openlinksw.com)

Weblogs (Blogs):
Legacy Blog: http://www.openlinksw.com/blog/~kidehen/
Blogspot Blog: http://kidehen.blogspot.com
Medium Blog: https://medium.com/@kidehen

Profile Pages:
Pinterest: https://www.pinterest.com/kidehen/
Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen
Twitter: https://twitter.com/kidehen
Google+: https://plus.google.com/+KingsleyIdehen/about
LinkedIn: http://www.linkedin.com/in/kidehen

Web Identities (WebID):
Personal: http://kingsley.idehen.net/dataspace/person/kidehen#this
        : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this




Received on Wednesday, 28 June 2017 14:17:06 UTC

This archive was generated by hypermail 2.3.1 : Wednesday, 28 June 2017 14:17:07 UTC