"2017-06-13T05:43:03.414145"^^ . . . . . . . . . . . "VirtODSFOAFSSL" . . . "VirtODSFOAFSSL" . . . . "VirtODSFOAFSSL" . . . . . . . . . . . "2017-06-13T05:43:03Z" . . . . "2017-06-13T05:43:03Z" . . . "---+FOAF+SSL Support in OpenLink Data Spaces\n\n---++What?\n\nFOAF+SSL is an authentication and authorization protocol that links a ''[Web ID]'' or \n\"[[http://virtuoso.openlinksw.com/dataspace/dav/wiki/Main/GetAPersonalURIIn5MinutesOrLess][Personal URI]]\" \nto a public key to create a global, decentralized, distributed, and secure authentication system that \nfunctions with existing browsers.\n\nFOAF+SSL uses PKI standards ? usually thought of as hierarchical trust management tools ? \n[[http://blogs.sun.com/bblfish/entry/foaf_ssl_pki_and_the][in a decentralized web-of-trust way]]. \nThe web of trust is built using semantic web vocabularies (particularly \n[[http://www.foaf-project.org/][FOAF]]) published in RESTful manner to form [Linked Data]. \n\nBased on well known existing standards, FOAF+SSL is currently in development, and is being discussed \non the [[http://lists.foaf-project.org/mailman/listinfo/foaf-protocols][FOAF protocols mailing list]].\n\nFor the most recent description of the protocol, read the one-page \n''[[http://blogs.sun.com/bblfish/entry/foaf_ssl_adding_security_to][FOAF+SSL: Adding Security to Open Distributed Social Networks]]''. \nFor a more detailed explanation of how the authentication works, see \n''[[http://blogs.sun.com/bblfish/entry/more_on_authorization_in_foaf][FOAF+SSL: Creating a Web of Trust without Key Signing Parties]]''.\n\n---++Why?\n\nAutomatic discovery of interpersonal trust relationships enables automatic application of \nappropriate permissions.\n\nIn other words, data owners can set fuzzy permissions like \"only let my friends see this\" \nor \"only let my family edit this.\" Applications can discover the relationships between \nthe data owner and the data requester/user, and permit (or disallow) any attempted actions, \nwithout needing the data owner to explicitly set permissions for each potential user. \n\nOne example might be a parent setting permissions on a photo gallery, to permit viewing only \nby \"immediate family\". The parent need not list each and every such relative specifically \nfor this application -- and need not add new permissions for a new family member (whether \nby marriage, birth, or otherwise), though they *do* need to be added to the owner's FOAF. \nWhen a new user comes and asks to see the pictures, the gallery application would check the \nrelationships declared by each person (the owner and the visitor), and if they matched up \n(in other words, the visitor could not get in simply by *claiming* a family relationship; \nthe relationship must be confirmed by the owner's FOAF data), the pictures would be shown.\n\n---++How?\n\n---+++ x.509 certificate\n\nThe FOAF+SSL consumer needs an x509 certificate with v3 extension \"Subject Alternate Name\". \nThis attribute is used for the owner's Web ID. For testing purposes we used OpenSSL demo CA \nto generate such certificates. If you are not using the OpenSSL demo CA, you must first setup \na self-signed CA; read OpenSSL documents on how to do this. \n\n 1 Add the following line to the [usr_cert] section of the openssl.cnf \nfile —\n\nsubjectAltName=$ENV::ALTNAME\n\n 1 Set the environment variable ALTNAME to the owner's Web ID, e.g., \n\nexport ALTNAME=URI:http://localhost/dataspace/person/myname#this\n\n 1 Make a self-signed certificate, e.g., \n\n$ CA.pl -newreq (follow the dialog) \n$ CA.pl -sign\n \n 1 When asked to commit the certificate, make sure you see several lines above, like —\n \n X509v3 Subject Alternative Name: \n URI:http://localhost/dataspace/person/myname#this \n \n 1 If your browser wants a PKCS#12 bundle, you must make one —\n \n$ openssl pkcs12 -export -in newcert.pem -inkey newkey.pem -out mycert.p12 \n \n 1 Rename newcert.pem and newkey.pem, to mycert.pem \nand mykey.pem for example. The PEM format of the certificate will be needed below.\n\n---+++ Setting up Virtuoso HTTPS \n\nTo enable the HTTPS listener, you will need another certificate. Existing certificates may not \nhave Subject Alternate Name, so you may want to generate one as in the previous section. \n\n 1 The next step is to move newcert.pem, newkey.pem, and cacert.pem \ninto the server's working directory. In our test case, we put the keys in a 'keys' \nsub-directory, and added the following lines to the [HTTPServer] section of the Virtuoso \nINI file, virtuoso.ini:\n \nSSLPort = 4443\nSSLCertificate = ./keys/localhost.cert.pem\nSSLPrivateKey = ./keys/localhost.key.pem\nX509ClientVerifyCAFile = ./keys/localhost.ca.pem\nX509ClientVerify = 1\nX509ClientVerifyDepth = 15\n \n 1 Also in the Virtuoso INI file, in the [URIQA] section, DefaultHost\n(localhost:8890 below) must be edited to correspond to the DNS-resolvable host name \n(\"CNAME\") of the Virtuoso host, combined with the ServerPort as set in the \n[HTTPServer] section of the same INI file. \n\n[URIQA]\nDynamicLocal = 1\nDefaultHost = localhost:8890\n\nFor instance, if the CNAME of the host is virtuoso.example.com, and the \nServerPort is 4321, the DefaultHost should be set to \nvirtuoso.example.com:4321\n\n[URIQA]\nDynamicLocal = 1\nDefaultHost = virtuoso.example.com:4321\n\n 1 Start the Virtuoso server, and look at the log file. Once HTTPS is up, you should see \nsomething like —\n \nHTTPS Using X509 Client CA ....\nHTTPS/X509 server online at 4443\n \n\n---+++ Setting Up Firefox \n\n 1 In the Preferences dialog, open the Advanced tab, and click the \"View certificates\" button. \n%BR%%BR%%BR%%BR%\n 1 Click the \"Add exception\" button ,and enter the address of the HTTPS server you've just\nconfigured, i.e., https://virtuoso.example.com:4443/\n 1 Click OK, and confirm the exception. \n%BR%%BR%%BR%%BR%\n 1 Click to the \"Your Certificates\" tab, and import mycert.p12. \n\n---+++ Configuring ODS Account to use FOAF+SSL \n\n 1 Log in to your ODS account, and edit your profile. \n 1 Click to the Security Tab, and scroll to the bottom, where you will find the X.509 certificate entry area.\n 1 Copy & paste the PEM format of the certificate (i.e., the content of mykey.pem, from earlier). \n 1 Press \"Save Certificate\" button, and you are set.\n\n---+++ Testing the setup \n\nTo test, we recommend [[http://www.mozilla.com/firefox/][Firefox]] v3 with the [[https://addons.mozilla.org/en-US/firefox/addon/5596][Tabulator extension]]. \nFirefox must be set to ask for RDF, as instructed in the [[http://dig.csail.mit.edu/2007/tab/][Tabulator documentation]].\n\n 1 Enter an ODS user's URI in the address bar, and the fun begins.\n 1 You should see a protected document's URI. Note that there is no specific \"address\" data seen:\n%BR%%BR%%BR%%BR%\n 1 When clicked, the browser will ask the user to select a certificate (note: certificate details are erased in picture below). \n%BR%%BR%%BR%%BR%\n 1 Now the protected document includes the private address data alongside the previously visible public data!\n%BR%%BR%%BR%%BR%\n\n---+++ FOAF+SSL ACLs\n\nYou can set FOAF+SSL ACLs from the [[VirtAuthServerUI][Virtuoso Authentication Server UI]]. A sample tutorial can be viewed [[VirtAuthFOAFSSLACL][here]]." . . . . "ee63cba5e83967fb8d7b190ae7c37a2b" . "2017-06-13T05:43:03.414145"^^ .