- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Fri, 30 Sep 2011 07:37:25 -0400
- To: public-xg-webid@w3.org
- Message-ID: <4E85A9F5.2000205@openlinksw.com>
On 9/30/11 5:46 AM, Jürgen Jakobitsch wrote:
> hi,
>
> thank you all for your input and pointers!
>
> i was originally asking this with respect to the question if it would be considered a good idea
> to separate the PublicKey from the webID-profile with the following scenario in mind.
>
It is a good idea.
> say i have my bank account and my cia-mysql-admin account protected by webID, go on holiday
> and want to be able to reach my home-pc for some reason, so it's online.
> while i'm sitting on the beach, somebody breaks into my house, launches firefox and simply
> uses my webID ("view certificates" and the page history should limit the number of webpages
> to try to log in to to a manageable degree).
>
> now, if i have my PublicKey in a separate place, i could put it into offline mode easily,
> even if i'm not a programmer who simply edits his webID-profile, but a normal user (otto normalverbraucher in german).
Your scenario needs a little fleshing out though. Remember, you have an
x.509 cert generated at some point. This action always precedes the
creation of a public key and WebID in a data space (wherever that might
be). Thus, you will need to invalidate the x.509 cert(s) on your home
machine by deleting existing WebID-CertPublicKey relations (triples)
from your profile space.
Based on the above, you could generate a new cert from you phone or
table device on the beach; assuming that at generation time you're able
to place a new values in X.509 SAN that points to a new or old data
space into which you have new WebID-CertPublicKey relations (triples).
> when separating keys from profiles there could be a concierge-service, where you could log in
> using a standard login method (user-pass) and put your key into offline mode. this makes the key
> not-dereferenceable and nobody could login using the certs of a stolen computer.
>
> example :
>
> <foaf:Person rdf:about="http://www.someuri.org/card#me">
> <!-- seeAlso, whatever -->
> <foaf:hasPublicKey rdf:resource="http://concierge.org/public-keys/2342"/>
> </foaf:Person>
>
Delete the data space relations, as per comment above and all associated
X.509 certs are rendered useless. SPARQL supports DELETE so that isn't a
problem.
Kingsley
>
> wkr http://www.turnguard.com/turnguard
>
--
Regards,
Kingsley Idehen
President& CEO
OpenLink Software
Web: http://www.openlinksw.com
Weblog: http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca: kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Friday, 30 September 2011 11:37:49 UTC