- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Tue, 10 Jan 2012 13:35:53 -0500
- To: public-xg-webid@w3.org
- Message-ID: <4F0C8509.9090407@openlinksw.com>
On 1/10/12 11:58 AM, Jürgen Jakobitsch wrote:
> hi,
>
> i'm not sure if this webid [1] meets your test criteria. anyway here are the results.
>
> 1. http://id.myopenlink.net/ods/webid_demo.html
> accepted
> 2. https://webid.turnguard.com:8443/WebIDTestServer/
> accepted
> 3. https://resourceme.bergnet.org
> failed
> 3.1. http://www.w3.org/2005/Incubator/webid/earl/RelyingParty#profileGet => failed
> and consequently all tests southwards failed.
> 4. http://webid.fcns.eu/
> passed (when using https://auth.fcns.eu/auth/index.php?authreqissuer=http://webid.fcns.eu/index.php)
> passed (when using https://foafssl.org/srv/idp?authreqissuer=http://webid.fcns.eu/index.php)
> 5. https://foafssl.org/test/WebId
> passed
>
> cleared cache, cookies and active logins (in firefox) and retried
>
> 6. https://resourceme.bergnet.org
> failed
> 6.1. http://www.w3.org/2005/Incubator/webid/earl/RelyingParty#profileAllKeysWellFormed => failed
> and consequently all tests southwards failed.
>
> wkr j
>
> [1] http://www.turnguard.com/turnguard
Jurgen,
For WebID, great i.e., you put it in SAN and it worked.
For Linked Data no [1][2]!
What you have proven is this: WebID doesn't need the full fidelity of
Linked Data. If it did, then your use of a slash URI that returns a 200
OK means Name/Address ambiguity, a Linked Data no-no. Ultimately, you
end up with problems associated with object equivalence fidelity (be it
by names or values). Using more conventional Linked Data parlance, via
this URI, you are confusing yourself with a document.
Conclusion: your slash URI doesn't exhibit the same Linked Data
characteristics demonstrated by mine [3][4]. That's not a bad thing
since my fundamental point is that:
1. my slash based HTTP URI is generated by my Linked Data platform.
2. use of my platform or others, shouldn't be the base requirement for
WebID if it seeks full Linked Data fidelity as a mandatory requirement
for HTTP URIs in a Certs. SAN.
You are proving my point !
SPARQL Query Proof:
## using old WebID query pattern since your graph is using old WebID
related relations still
PREFIX : <http://www.w3.org/ns/auth/cert#>
PREFIX xsd: <http://www.w3.org/2001/XMLSchema#>
SELECT * WHERE {
?identity cert:identity <http://www.turnguard.com/turnguard> .
?identity rsa:modulus ?m ;
rsa:public_exponent ?e . }
SPARQL Protocol URL Links:
1. http://uriburner.com/c/IBZM4R -- sparql query results
2. http://uriburner.com/c/IBJUQG -- sparql query editor.
Links:
1. http://uriburner.com/c/IBJUQP -- URI debugger output (note: re.
Linked Data that should be a 200 OK)
2. http://uriburner.com/c/IBJUQS -- note how it shows you only have
descriptor (information) resource address
3. http://uriburner.com/c/IBZM45 -- notice the 303 (how HTTP message
exchange is used to facilitate indirection via redirection)
4. http://uriburner.com/c/IBYXSV -- note how the report concludes that I
have a generic Name distinct from a descriptor (information) resource
address.
Thank you once again, for helping me showcase an inevitable problem for
those who want to start their WebID journey in commodity/consumer mode
leveraging "cut, paste, and place at an address" patterns i.e., the most
common Web technology exploitation pattern.
Solutions:
1. Lower Linked Data fidelity requirements in WebID -- it becomes an
option, so 200 OK is fine if the SPARQL ASK still works
2. Allow multiple HTTP URIs in SAN where functions are clear re. Name
and Address roles
3. Consider another (optional) location for the descriptor (information)
resource address e.g. sIA.
We need at least one of the above to address the problem introduced by
HTTP URIs. One that many just don't understand until bitten.
Kingsley
>
> ----- Original Message -----
> From: "Kingsley Idehen"<kidehen@openlinksw.com>
> To: "WebID XG"<public-xg-webid@w3.org>
> Sent: Tuesday, January 10, 2012 3:30:32 PM
> Subject: Slash URIs and WebID Experiment
>
> All,
>
> The URI:
> http://id.myopenlink.net/about/id/entity/http/twitter.com/kidehen , is
> now fine for testing purposes.
>
> I've verified successfully using:
>
> 1. http://id.myopenlink.net/ods/webid_demo.html
> 2. https://webid.turnguard.com:8443/WebIDTestServer/
> 3. https://resourceme.bergnet.org
> 4. http://webid.fcns.eu/
> 5. https://foafssl.org/test/WebId .
>
>
> Now, it would be nice to see someone else produce a Cert. with a slash
> based HTTP URI in its SAN that passes through all of the above, or at
> least a majority of them.
>
> At this juncture, for experimentation you have the following HTTP URI
> based Names:
>
> 1. http://kingsley.idehen.net/dataspace/person/kidehen#this
> 2. http://id.myopenlink.net/about/id/entity/http/twitter.com/kidehen .
>
>
--
Regards,
Kingsley Idehen
Founder& CEO
OpenLink Software
Company Web: http://www.openlinksw.com
Personal Weblog: http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca handle: @kidehen
Google+ Profile: https://plus.google.com/112399767740508618350/about
LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Tuesday, 10 January 2012 18:38:43 UTC