Shared publicly  - 
 
Simple WebID Exploitation via DropBox based Linked Data Deployment

In my last two posts [1][2], I used a simple Turtle document to demonstrate how anyone deploy Linked Data without any of the following hurdles:

1. Domain Ownership
2. Web Server Access and Administrator Privileges
3. Content Negotiation
4. de-referencabe URI (Hyperlink) style selection.

My initial post focused on the task of producing a simple profile document where you make some very basic claims about yourself. In this post, I am going a step further by incorporating additional personal profile claims, en route to demonstrating how Linked Data enables you control your identity via verification of identity claims that you make about yourself. 

Steps

1. Create a simple Turtle based profile document and upload it to a DropBox folder -- as outlined in my simple Linked Data Deployment post

2. Use an X.509 Certificate Generator [3][4] to produce a certificate with a WebID (Personal de-referencable URI) in the SubjectAlternativeName (SAN) field -- this is simply a URI that denotes (names) entity "You", the primary topic of the Turtle profile document you've created e.g., <https://dl.dropbox.com/u/11096946/Linked%20Data%20Resources/kingsley.ttl#this

3. Create a triple (3-tuple) based relationship in your profile document that associates your WebID (Personal URI) with the newly generated certificate's public key components (modulus and exponent)

4. Do the same thing with the certificate's fingerprint (the SHA1 or MD5 hash of the entire certificate).

Certificate Generation Notes

Certificate Generation

For this exercise I deliberately used the Certificate Generator component of the Mac OS X Keychain application. I've attached screenshots and a link to a Google Drive folder [5], but they might not be in perfect sequence to to G+ limitations in this regard. 

I've also included screenshots from our Web hosted Certificate Generator which is also an option for producing X.509 certificates that carry an WebID watermark, with the WebI authentication protocol in mind. 

Actual Profile Document Tweaks

Here are two excerpts from my Turtle based profile document [6] highlighting the relationships that enable your profile document serve as a mirror of identity claims matching those imprinted into the X.509 certificate stored in the local keystore of your personal computing device (desktop, notebook, tablet, or phone).

Identity Verification Protocol Requirements


## WebID Authentication Protocol Requirements Start Here ##

:this cert:key :pubKey .
:pubKey a cert:RSAPublicKey;

# Public Key Exponent -- copy and paste this from your X.509 Certificate viewer

cert:exponent "65537"^^xsd:integer;

# Public Key Modulus -- copy and paste this from your X.509 Certificate viewer

cert:modulus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xsd:hexBinary .

## WebID Authentication Protocol Requirements End Here ##

## NetID / YouID Authentication Protocol Requirements Start Here ##

# Note: NetID / YouID are WebID authentication protocol derivatives that use a Fingerprint (certificate hash) for complete "claims mirror" between your profile document and the X.509 certificate in your local keystore. Thus, instead of looking up public key components it looks up the certificate fingerprint. 

:this opl:hasCertificate :cert .

# Certificate Fingerprint -- copy and paste from your X.509 Certificate viewer (remove the spaces).

:cert opl:fingerprint "F24F7067FED11A7925CC10A7AE4CDAABB2FF0B85"^^xsd:hexBinary;
opl:fingerprint-digest "sha1" .

## NetID / YouID Authentication Protocol Requirements End Here ##

Identity Verification

Now that your Turtle based profile document has been enhanced with identity claims that mirror those in your local WebID watermarked X.509 certificate, you can verify the effects of this endeavor by performing a simple identity verification check via any of the following:

1. http://bit.ly/PyqHqe -- our simple Identity Claims Verification Service -- just click on the "check" button, then select your WebID watermarked X.509 certificate and you'll get success of failure

2. http://bit.ly/P3YbZM -- our simple OpenID+WebID proxy service that enables you experience how WebID eliminates the use of passwords when authenticating against any functional OpenID site, just use the URL pattern: 
http://id.myopenlink.net/openid-proxy/id.vsp?w={WebID}

3. http://delicious.com/kidehen/webid_demo -- test against other WebID compliant applications and services. 

Links

1. http://bit.ly/NYwGCd -- Very simple Linked Data Deployment via a Turtle Document  

2. http://bit.ly/LNIeLj -- Detailed guide to Linked Data Deployment via a Turtle Document 

3. http://bit.ly/Mrzhpz -- YouID X.509 Certificate Generator

4. http://bit.ly/P3QMJX -- Other X.509 Certificate Generators

5. http://bit.ly/P3VJ5q -- Google Drive Folder holding screenshots re. use of the Keychain Certificate Generator Assistant and our Web based Generator 

6. http://bit.ly/LQnyCt -- My actual Turtle based Profile Document published to an Amazon S3 bucket 

7. http://bit.ly/POZW1z -- My actual Turtle based Profile Document published to a DropBox folder. 

Related

1. http://bit.ly/P3WECX -- Simple WebID Exploitation via Amazon S3 based Linked Data Deployment .

#LinkedData #WebID #Web30 #SemanticWeb #Identity #Nymwars #Privacy #PDS #AWS #DropBox
3
6
Add a comment...