- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Wed, 28 Jun 2017 10:16:36 -0400
- To: Martynas Jusevičius <martynas@atomgraph.com>, public-webid@w3.org
- Message-ID: <e0f89842-9619-22f6-3db2-3571ec0c223f@openlinksw.com>
On 6/27/17 8:44 PM, Martynas Jusevičius wrote: > Kingsley, > > I am implementint WebID authentication in our software, and key > mismatch is a real scenario. > > Can you show me where in the spec it is addressed? Martynas, Your comments are confusing. Are you speaking of the WebID+TLS protocol which is basically a TLS-handshake extension that uses a WebID lookup (using value of SAN attribute in an X.509 Cert) to locate a Public Key in a WebID-Profile document? If not, then we are not speaking about the same thing, and as a result not communicating effectively. Terms: 1. WebID -- HTTP URI that identifies an Agent and adheres to Linked Data principles 2. WebID-Profile Document -- a collection of RDF statements in an RDF document that describe an Agent identified by a WebID 3. WebID+TLS -- TLS handshake extension that matches Public Keys in an X.509 cert and a WebID-Profile document by way of WebID de-reference 4. WebID+TLS+Delegation -- adds an additional lookup route to #3 via acl:delegates relation Kingsley > > On Wed, 28 Jun 2017 at 02.04, Kingsley Idehen <kidehen@openlinksw.com > <mailto:kidehen@openlinksw.com>> wrote: > > On 6/27/17 6:33 PM, Martynas Jusevičius wrote: > > Hi, > > > > I think there is another case where failure scenario is not > defined in > > protocol: verifying the WebID. > > > > What happens if the certificate key does not match the WebID > key? None > > of the verification steps or sections seem to consider that. I > suggest > > again that a 400 Bad Request should be returned. > > > > I think it is important for the protocol to handle failures if > we want > > robust implementations. > > > > Is this group active enough to fix such issues? > > > > > > Martynas > > > Hi Martynas, > > What do you mean by Certificate Key? Are you referring to the > Public Key > component of an X.509 Certificate? > > Bearing in mind that WebID+TLS isn't new, are there are > implementations > out in the wild, wouldn't it be better if you started off by testing > authentication of your WebID against existing implementations? > > You might also find the YouID browser extension we built interesting > since its sole purpose is simplification of WebID+TLS and/or > WebID+TLS+Delegation protocol usage (e.g., negating the UX headache > introduced by browsers when toggling WebIDs over and existing TLS > session) [1]. > > You can try: > > [1] http://linkeddata.uriburner.com/sparql -- click on "login" button > > [2] http://osdb.openlinksw.com -- click on the "login" button > > [3] http://id.myopenlink.net/ods/webid_demo.html -- most basic > WebID+TLS > authentication tool we have > > Links: > > [1] > https://medium.com/openlink-software-blog/simple-youid-browser-extension-usage-exercise-57fa3ff6c6b7 > -- Simple YouID Browser Extension Usage Exercise. > > -- > Regards, > > Kingsley Idehen > Founder & CEO > OpenLink Software (Home Page: http://www.openlinksw.com) > > Weblogs (Blogs): > Legacy Blog: http://www.openlinksw.com/blog/~kidehen/ > <http://www.openlinksw.com/blog/%7Ekidehen/> > Blogspot Blog: http://kidehen.blogspot.com > Medium Blog: https://medium.com/@kidehen > > Profile Pages: > Pinterest: https://www.pinterest.com/kidehen/ > Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen > Twitter: https://twitter.com/kidehen > Google+: https://plus.google.com/+KingsleyIdehen/about > LinkedIn: http://www.linkedin.com/in/kidehen > > Web Identities (WebID): > Personal: http://kingsley.idehen.net/dataspace/person/kidehen#this > : > http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this > > -- Regards, Kingsley Idehen Founder & CEO OpenLink Software (Home Page: http://www.openlinksw.com) Weblogs (Blogs): Legacy Blog: http://www.openlinksw.com/blog/~kidehen/ Blogspot Blog: http://kidehen.blogspot.com Medium Blog: https://medium.com/@kidehen Profile Pages: Pinterest: https://www.pinterest.com/kidehen/ Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen Twitter: https://twitter.com/kidehen Google+: https://plus.google.com/+KingsleyIdehen/about LinkedIn: http://www.linkedin.com/in/kidehen Web Identities (WebID): Personal: http://kingsley.idehen.net/dataspace/person/kidehen#this : http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Wednesday, 28 June 2017 14:17:06 UTC