- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Mon, 08 Oct 2012 08:53:41 -0400
- To: public-xg-webid@w3.org
- Message-ID: <5072CCD5.2030207@openlinksw.com>
On 10/7/12 5:14 PM, Melvin Carvalho wrote: > >> >> Why is that? >> >> >> If the private key is stored on your webmail provider or mozilla >> they can create a certificate to impersonate you. This means >> they can view your account or even create an account on the >> relying party. Say you had some confidential documents on a >> service, it means your webmail provider can read not only your >> mail, but your external documents. > > They can create a certificate to impesonate your - your e-mail > that is - anyway, even without your private key. BrowserId Relying > parties only consider the signature of the certificate for > verifying it. So the private key is neither here nor there. > > > Sure there's actually TWO private keys in play. The 'master' key > which is used to sign and your temporary key in the browser. > > It's possible to impersonate with WebID if they take over your > identity page. But the key would change which is suspicious. Even SSH > warns you when a key changes and alerts you to a possible attack. Only if you assume this is about WebID as opposed to WebID + ACLs, as I referenced earlier in one of these threads. You can't speak of this issue as being about WebID solely, its the effect of WebIDs combined with ACLs or data access policies. A resource owner can add other factors into the mix re. access policies. All of the factors used to determine "identity" don't have to reside in the Certificate or Profile document, understanding and internalizing this is really important. This is what the URI serving as WebID facilitates. -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter/Identi.ca handle: @kidehen Google+ Profile: https://plus.google.com/112399767740508618350/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Monday, 8 October 2012 12:54:04 UTC