- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Sat, 2 Mar 2019 18:10:49 -0500
- To: Sebastian Hellmann <hellmann@informatik.uni-leipzig.de>, public-webid@w3.org
- Message-ID: <fd59f566-be4a-ce15-039f-5c2213dabcc0@openlinksw.com>
On 3/2/19 8:19 AM, Sebastian Hellmann wrote:
>
> Hi all,
>
> I know that everybody is enthusiastic about WebID, but I would like to
> know a bit more about what to take care of, when setting this up.
>
> 1. https://xkcd.com/792/ applies, right? So If use another server
> for hosting WebID like http://holycrab13.github.io/webid.ttl
> Microsoft could change the pub key in some requests (without changing
> the data) and then log into almost anything.
>
A WebID is an identifier. That's it.
A WebID-Profile Document is the document to which a WebID resolves. It
is the place where credentials (Identity Claims) reside.
The WebID-TLS and WebID-TLS+Delegation protocols are Authentication
Protocols that verify a WebID by reconciling Identity Claims in an X.509
with specific claims in a WebID-Profile document, courtesy of the
objects of a specific relation i.e., cert:key .
Logging into a Data Space doesn't mean you have access to anything. A
Data Space will use WebACLs to control access (in various modes) to
resources.
In this game, the following are loosely-coupled ensuring no single
point of failure or vulnerability:
Identity (WebID), Identification (WebID-Profile Doc), Authentication
(WebID-TLS or WebID-TLS+Delegation protocols), Authorization (WebACLs),
and Storage (Data Spaces hosting a collection of Resources/Documents).
> Same for the WebId on my own server: http://kurzum.net/webid.ttl If
> this get's compromised it is like a meteor hit, since you would have
> only one identity for everything.
>
> 2. This weakness is also mentioned in the security section of OpenID
> https://en.wikipedia.org/wiki/OpenID#Privacy_and_trust_issues and
> therefore all OpenID Connect weaknesses and security risks apply for
> WebID OpenConnect as well.
>
No!
OpenID isn't driven by the same mechanisms as WebID-TLS or
WebID-TLS+Delegation.
> 3. anything else? I guess the TLS part is quite standard then.
>
TLS is a standard extended by WebID lookups re. WebID-TLS and
WebID-TLS+Delegation.
> Although I would need to check whether third parties listening to the
> traffic can trace your public key. (inversefunctional?) So they would
> know that you made a connection, but not the content of the connection.
>
Your Public Key doesn't mean much in a loosely-coupled system that's
driven by logic expressed in RDF statement collections.
Kingsley
> --
> All the best,
> Sebastian Hellmann
>
> Director of Knowledge Integration and Linked Data Technologies (KILT)
> Competence Center
> at the Institute for Applied Informatics (InfAI) at Leipzig University
> Executive Director of the DBpedia Association
> Projects: http://dbpedia.org, http://nlp2rdf.org,
> http://linguistics.okfn.org, https://www.w3.org/community/ld4lt
> <http://www.w3.org/community/ld4lt>
> Homepage: http://aksw.org/SebastianHellmann
> Research Group: http://aksw.org
--
Regards,
Kingsley Idehen
Founder & CEO
OpenLink Software
Home Page: http://www.openlinksw.com
Community Support: https://community.openlinksw.com
Weblogs (Blogs):
Company Blog: https://medium.com/openlink-software-blog
Virtuoso Blog: https://medium.com/virtuoso-blog
Data Access Drivers Blog: https://medium.com/openlink-odbc-jdbc-ado-net-data-access-drivers
Personal Weblogs (Blogs):
Medium Blog: https://medium.com/@kidehen
Legacy Blogs: http://www.openlinksw.com/blog/~kidehen/
http://kidehen.blogspot.com
Profile Pages:
Pinterest: https://www.pinterest.com/kidehen/
Quora: https://www.quora.com/profile/Kingsley-Uyi-Idehen
Twitter: https://twitter.com/kidehen
Google+: https://plus.google.com/+KingsleyIdehen/about
LinkedIn: http://www.linkedin.com/in/kidehen
Web Identities (WebID):
Personal: http://kingsley.idehen.net/public_home/kidehen/profile.ttl#i
: http://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Saturday, 2 March 2019 23:11:18 UTC