[OpenID] cryptographics web of trust
Peter Williams
pwilliams at rapattoni.com
Sun Aug 19 20:53:53 UTC 2007
Henry
In terms of prior art, I believe I can now recast what you describe on - or imply in http://blogs.sun.com/bblfish/entry/cryptographic_web_of_trust.
(1) You are choosing to act as a Certification Authority, resigning the public keys of your friends.
Properly, you confirmed your fiends realworld's id via biometrics.. before performing the act of certification.
You also published a policy-wide affidavit that represents your certification semantics : "These keys were assured enough for my purposes! Information redundancy SHOULD furthermore assure anyone doubting the required SemWeb integrity."
You then stored the signatures of such "two-part certificates" on your server: the public keys remain on your friends' servers. This contrasts with a PGP keyring.
I'll assume your scheme can apply equally to OpenID Server-agents and Consumer-agents which must rely on each other.
(2) You can also be said to be acting as a maintainer of a "Certificate Trust List". Have your apache script now compute in real-time, the python equivalent of
const string FOAF = "http://xmlns.com/foaf/0.1/";
static read-only Entity foafknows = FOAF + "knows";
static readonly Entity foafname = FOAF + "name";
using (RdfWriter w = new N3Writer(Console.Out))
{
store.Select(new Statement(null, foafname, null), w);
store.Select(new Statement(null, foafknows, null), w);
}
Then, have an HTTP filter in your servlet engine handle the N3 signing "suitably" and on the fly - targeting both HTTP proxies and end-users .
This allows folks to use you now as an "authority" - introducing them to else might be a decent _authority_ to rely upon. They use you and those others your introduce as _authoritative_ redundant access points ... when they must obtain those certifications protecting the integrity of those critical (publickey->foafname) bindings.
Note I have not YET addressed your suggestion that yet another FOAF file can be authoritative for "organizations" - such as SUN, that may be operating an OpenID-server providing authoritative certification info and discovery information to other authorities.
Perhaps, let's formalize authority and crypto - before binding those constructs to "organizational" notions that are typically tied to hierarchical naming, and sometimes corresponding hierarchical authority meshes. I'm still digesting your http://blogs.sun.com/bblfish/entry/a_foaf_file_for_sun as it relates to OpenID Auth.
________________________________
From: general-bounces at openid.net on behalf of Peter Williams
Sent: Sun 8/19/2007 11:34 AM
To: Henry Story
Cc: OpenID General
Subject: Re: [OpenID] cryptographics web of trust
Henry:
I've now learned basic N3. Programming it helped. Reading an RDF book did not.
More information about the general
mailing list