A global distributed Social Web requires that each person be able to control their identity, that this identity be linkable across sites - placing each person in a Web of relationships - and that it be possible to authenticate globally with such identities. By making distributed authentication easy one can allow everybody to protect their resources and enable their preferred privacy settings.
This specification outlines a simple universal identification mechanism that is distributed, openly extensible, improves privacy, security and control over how each person can identify themselves in order to allow fine grained access control to their information on the Web. It does this by applying the best practices of Web Architecture whilst building on well established widely deployed protocols and standards including HTML, URIs, HTTP, TLS, X.509 Certificates, and RDF Semantics.
There are a number of concepts that are covered in this document that the
reader may want to be aware of before continuing. General knowledge of
public key cryptography
and RDF [[!RDF-PRIMER]] is necessary to understand how
to implement this specification.
A general Introduction is provided for all that would like to understand why this specification is necessary to simplify usage of the Web.
The terms used throughout this specification are listed in the section titled Terminology.
Developers that are interested in implementing this specification will be most interested in the sections titled Authentication Sequence and Authentication Sequence Details.
The WebID-TLS protocol enables secure, efficient and maximally user friendly authentication on the Web.
It enables people to authenticate onto any site by simply choosing one of the certificates proposed to them by their browser.
These certificates can be created by any Web Site for their users.
This specification extends the WebID Identity [[!WEBID]] specification which defines many of the core concepts used in WebID-TLS, such as the identifier, known as the
WebIDs can be used to build a Web of trust using vocabularies such as [[!FOAF]] by allowing people to link together their profiles in a public or protected manner.
Such a web of trust can then be used by a
The WebID-TLS protocol specifies how a
WebID authentication can also be used for automatic authentication by robots, such as web crawlers of linked data repositories, which could be agents working on behalf of users to help them in their daily tasks.
This specification is divided in the following sections.
This section gives a high level overview of the WebID-TLS Protocol, and presents the organization of the specification and the conventions used throughout the document.
Section 2 lists the preconditions that need to be in place for any authentication sequence to be successful: which include the creation of a
Section 3 on the WebID-TLS Protocol describes in detail how a server can authenticate a user.
Subject Alternative Name
s of the agent that knows the private key should not be assumed to be true until verified.
A WebID Claim then is the statement of Identity between the Subject Alternative Name
and the public key in the certificate.
In Turtle this can be written as
:bob cert:key [ a cert:RSAPublicKey; cert:modulus "00cb24ed85d64d794b..."^^xsd:hexBinary; cert:exponent 65537 ] .
Subject Alternative Name
extension with at least one URI entry identifying the https://bob.example/profile#me
would contain the following:
X.509v3 extensions: ... X509v3 Subject Alternative Name: URI:https://bob.example/profile#meAnd it would have a
https://bob.example/profile
.
Examples assume the following namespace prefix bindings unless otherwise stated:
Prefix | IRI |
---|---|
cert |
http://www.w3.org/ns/auth/cert# |
xsd |
http://www.w3.org/2001/XMLSchema# |
foaf |
http://xmlns.com/foaf/0.1/ |
bob |
https://bob.example/profile# |
The bob: namespace is a URI that refers to Bob's profile, where Bob is an imaginary character well known in security circles.
The Subject Alternative Name
URI entry.
This URI must be one that dereferences to a cert:key
relation from the
For example, if a user Bob controls https://bob.example/profile
,
then his https://bob.example/profile#me
When creating a certificate it is very important to choose a user friendly Common Name (CN) for the user, that will allow him to distinguish between different certificates he may have, such as a personal or a business certificate, when selecting one from his browser.
In the example below the CN is Bob (personal)
.
This name can then also be displayed by any server authenticating the user as a human friendly label.
The <a href="https://...">
anchor.
That is the CN should be a label and the
As an example to use throughout this specification here is the following certificate as an output of the OpenSSL program.
Certificate: Data: Version: 3 (0x2) Serial Number: 5f:df:d6:be:2c:73:c1:fb:aa:2a:2d:23:a6:91:3b:5c Signature Algorithm: sha1WithRSAEncryption Issuer: O={}, CN=WebID Validity Not Before: Jun 8 14:16:14 2010 GMT Not After : Jun 8 16:16:14 2010 GMT Subject: O=bob.example, OU=cert creation, CN=Bob (personal) Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:cb:24:ed:85:d6:4d:79:4b:69:c7:01:c1:86:ac: c0:59:50:1e:85:60:00:f6:61:c9:32:04:d8:38:0e: 07:19:1c:5c:8b:36:8d:2a:c3:2a:42:8a:cb:97:03: 98:66:43:68:dc:2a:86:73:20:22:0f:75:5e:99:ca: 2e:ec:da:e6:2e:8d:15:fb:58:e1:b7:6a:e5:9c:b7: ac:e8:83:83:94:d5:9e:72:50:b4:49:17:6e:51:a4: 94:95:1a:1c:36:6c:62:17:d8:76:8d:68:2d:de:78: dd:4d:55:e6:13:f8:83:9c:f2:75:d4:c8:40:37:43: e7:86:26:01:f3:c4:9a:63:66:e1:2b:b8:f4:98:26: 2c:3c:77:de:19:bc:e4:0b:32:f8:9a:e6:2c:37:80: f5:b6:27:5b:e3:37:e2:b3:15:3a:e2:ba:72:a9:97: 5a:e7:1a:b7:24:64:94:97:06:6b:66:0f:cf:77:4b: 75:43:d9:80:95:2d:2e:85:86:20:0e:da:41:58:b0: 14:e7:54:65:d9:1e:cf:93:ef:c7:ac:17:0c:11:fc: 72:46:fc:6d:ed:79:c3:77:80:00:0a:c4:e0:79:f6: 71:fd:4f:20:7a:d7:70:80:9e:0e:2d:7b:0e:f5:49: 3b:ef:e7:35:44:d8:e1:be:3d:dd:b5:24:55:c6:13: 91:a1 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: critical CA:FALSE X509v3 Key Usage: critical Digital Signature, Non Repudiation, Key Encipherment, Key Agreement Netscape Cert Type: SSL Client, S/MIME X509v3 Subject Key Identifier: 08:8E:A5:5B:AE:5D:C3:8B:00:B7:30:62:65:2A:5A:F5:D2:E9:00:FA X509v3 Subject Alternative Name: critical URI:https://bob.example/profile#me Signature Algorithm: sha1WithRSAEncryption cf:8c:f8:7b:b2:af:63:f0:0e:dc:64:22:e5:8a:ba:03:1e:f1: ee:6f:2c:f5:f5:10:ad:4c:54:fc:49:2b:e1:0d:cd:be:3d:7c: 78:66:c8:ae:42:9d:75:9f:2c:29:71:91:5c:29:5b:96:ea:e1: e4:ef:0e:5c:f7:07:a0:1e:9c:bf:50:ca:21:e6:6c:c3:df:64: 29:6b:d3:8a:bd:49:e8:72:39:dd:07:07:94:ac:d5:ec:85:b1: a0:5c:c0:08:d3:28:2a:e6:be:ad:88:5e:2a:40:64:59:e7:f2: 45:0c:b9:48:c0:fd:ac:bc:fb:1b:c9:e0:1c:01:18:5e:44:bb: d8:b8
Should we formally require the last issuer of a chain of certificates
to be O={}, CN=WebID
This would allow the server to request only WebID enabled certificates, or even WebID enabled
certificates in addition to CA signed certificates it trusts using the certificate_authorities
field in the TLS request.
The above certificate is no longer valid.
Many tools exist to create Certificates.
Some
<form action="/srv/certificateMaker" method="POST"> <keygen challenge="random" name="spkac"/> <input type="submit" name="Create Certificate"/> </form>
When the user clicks such a form, the following sequence can take place on a properly configured server:
POST
The private key never leaves the secure Key Store. This exchange allows the Server to make the decision about what the Certificate should say, what the WebID should be, and to simultaneously add the public key to the User's
The xsd
datatypes.
The cert ontology will be extended to cover DSA, Eliptic Curve Cryptography, and other cryptographic alogrithms as requests for them are made, proposals accepted, and when enough working and compatible implementations can be shown to work. Please contact the WebID Comunity Group with requests and proposals.
The set of relations to be published at theThe document can publish many more relations that are of interest to the WebID-TLS protocol, as shown in the above graph by the grayed out relations.
For example Bob can publish a depiction or logo, so that sites he authenticates to can personalize the user experience. He can post links to people he knows, where those have
The protocol does not depend on any particular serialization of the graph, provided that agents are able to parse that serialization and obtain the graph automatically, see examples in the [[!WEBID]] specification.
RDF graphs are built using vocabularies defined by URIs, that can be placed in subject, predicate or object position. The definition of each URI should be found at the namespace of the URI. Here we detail the core cryptographic terms needed. The optional foaf vocabulary used to describe agents can be found at the the foaf namespace vocabulary document.
Below is a short summary of the vocabulary elements to be used when conveying the relation between the
A widely used format for writing RDF graphs by hand is the Turtle [[!turtle]] notation.
It is easy to learn, and very handy for communicating over e-mail and on mailing lists.
The syntax is very similar to the SPARQL query language.
Turtle should be served with the text/turtle
mime type.
@prefix cert: <http://www.w3.org/ns/auth/cert#> . @prefix xsd: <http://www.w3.org/2001/XMLSchema#> . @prefix foaf: <http://xmlns.com/foaf/0.1/> . @prefix rdfs: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> . <#me> a foaf:Person; foaf:name "Bob"; foaf:knows <https://example.edu/p/Alois#MSc>; foaf:img <http://bob.example/picture.jpg>; cert:key [ a cert:RSAPublicKey; rdfs:label "made on 23 November 2011 on my laptop"; cert:modulus "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"^^xsd:hexBinary; cert:exponent 65537 ; ] .
A
In either situation if the rdfs:label
with a creation date was used for this purpose.
In order to give the full context of a
The steps in detail are as follows:
Subject Alternative Name
extension of the https://...
This section covers details about each step in the authentication process.
Standard SSLv3 and TLSv1 and upwards can be used to establish the connection between
the Client and the
Many servers allow a simple form of TLS client side authentication to be setup when configuring a
Once the TLS connection has been setup, the application layer protocol interaction can start. This could be an HTTP GET request on the protected resource for example.
If the protocol permits it, the Client can let the Application layer, and especially the
Bergi proposed a header for HTTP which could do this. Please summarise it.
The
Because a
TLS allows the server to request a Certificate from the Client using the CertificateRequest
message [Section 7.4.4] of TLS v1.1 [[!TLS]]. Since WebID TLS authentication does not rely on CAs signing the certificate to verify the certificate_authorities
field blank in the request.
From our experience leaving the certificate_authorities field empty leads to the correct behavior on all browsers and all TLS versions.
Should we formally require the last issuer of a chain of certificates
to be O={}, CN=WebID
This would allow the server to request only WebID enabled certificates, or even WebID enabled
certificates in addition to CA signed certificates it trusts using the certificate_authorities
field in the TLS request.
A security issue with TLS renegotiation was discovered in 2009, and an IETF fix was proposed in [[!RFC5746]] which is widely implemented.
If the Client does not send a certificate, because either it does not have one or it does not wish to send one, other authentication procedures can be pursued at the application layer with protocols such as OpenID, OAuth, BrowserID, etc...
As much as possible it is important for the server to request the client certificate in WANT
mode, not in NEED
mode.
If the request is made in NEED
mode then connections will be broken off if the client does not send a certificate.
This will break the connection at the application protocol layer, and so will lead to a very bad user experience. The server should therefore avoid doing this unless it can be confident that the client has a certificate - which it may be because the client advertised that in some other way to the server.
Is there some normative spec about what NEED and WANT refer to?
The
If we first consider
The fragment identifier component of a URI allows indirect identification of a secondary resource by reference to a primary resource and additional identifying information. The identified secondary resource may be some portion or subset of the primary resource, some view on representations of the primary resource, or some other resource defined or described by those representations. [...] The semantics of a fragment identifier are defined by the set of representations that might result from a retrieval action on the primary resource.
In order therefore to know the meaning of a
The trust that can be had in that statement is therefore the trust that one can have in one's having received the correct representation of the document that defined that
If the authenticity of the server hosting the WebID profile document is proven through the use of HTTPS, then the trust one can have in the agent at the end of the TLS connection being the referent of the
Add explanation for URI with redirect.
The Verification Agent needs to fetch the document, if it does not have a valid one in cache.
The WebID
The text/turtle
with a higher priority than text/html
and application/rdf+xml
. The reason is that it is quite likely that many sites will produce non marked up HTML and leave the graph to the pure RDF formats.
If the
To check a cert:key
relation. In other words, one has to check if those statements are present in the graph.
Testing for patterns in graphs is what the SPARQL query language is designed to do [[!RDF-SPARQL-QUERY]]. We will first look at how to use this as it is also the simplest method, and then what some other programmatic options may be.
Below is the SPARQL Query Template which should be used for an RSA public key. It contains three variables ?webid
, ?mod
and ?exp
that need to be replaced by the appropriate values:
PREFIX : <http://www.w3.org/ns/auth/cert#> PREFIX xsd: <http://www.w3.org/2001/XMLSchema#> ASK { ?webid :key [ :modulus ?mod; :exponent ?exp; ] . }
The variables to be replaced for each
Variable | Details on its value. |
---|---|
?webid | should be replaced by the <...> in the position of the ?webid variable. |
?mod | should be replaced by the modulus written as a xsd:hexBinary as specified by the cert:modulus relation. All leading double 0 bytes (written "00" in hexadecimal) should be removed. The resulting hexadecimal should then be placed in the space of the XXX in "XXX"^^xsd:hexBinary |
?exp | should be replaced by the public exponent written as an xsd:integer typed literal. In SPARQL as in Turtle notation this can just be written directly as an integer. |
Assuming that we received Bob's key whose modulus starts with cb24ed85d64d794b6...
and whose exponent is 65537
then the following query should be used:
PREFIX : <http://www.w3.org/ns/auth/cert#> PREFIX xsd: <http://www.w3.org/2001/XMLSchema#> ASK { <https://bob.example/profile#me> :key [ :modulus "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"^^xsd:hexBinary; :exponent 65537; ] . }
An ASK query simply returns true or false. If it returns true, then the key was found in the graph with the proper relation and the claim is verified.
When processing the queries in the above template, unexpected results may appear if the representation of a modulus or exponent contains whitespace characters in the initial and/or final position. To avoid these unexpected results, the query engine MUST support the D-entailment regime for xsd:hexBinary
and xsd:integer
as specified in SPARQL 1.1 Entailment Regimes.
For verifiers that do not have access to a SPARQL query engine but can query the RDF data programmatically, it is relatively easy to emulate the above SPARQL query programmatically. There are a number of ways of doing this, some more efficient than others.
If the RDF library does datatype normalization of all literals before loading them, then the most efficient way to execute this would be to start by searching for all triples whose subjects have relation cert:modulus
to the literal which in our example was "cb24ed..."^^xsd:hexBinary
. One would then iterate through all the subjects of the relations that satisfied that condition, which would most likely never number more than one, and from there filter out all those that were the object of the cert:modulus
relation of the bob:me
. Finally one would verify that one of the keys that had satisfied those relations also had the cert:exponent
relation to the number which in the example above is "65537"^^xsd:integer
.
For triples stores that do not normalize literals on loading a graph, the normalization will need to be done after the query results and before matching those with the values from the bob:me
and find all its cert:key
relations to objects - which we know to be keys - and then iterate through each of those keys' modulus and exponent, and verify if the normalized version of the value of those relation is equal to the numbers found in the certificate. If one such key is found then the answer is true
, otherwise the answer will be false
.
Once the
In an WebID authentication process, three actors are involved: the authenticating
During authentication, the
The development of a limited number of easy to understand and machine readable privacy policies, would greatly help users make informed decisions in this space.
Further flexibility may be offered to the authenticating
To avoid potential deadlock problems, where one server needs to authenticate into a second server that itself requires authentication, etc... ,
Even though a
As a consequence of dereferencing the
Servers identify themselves in any transaction, and even more so when the transactions are done over HTTPS. A server must make sure that information is served only to Agents that are allowed access to that information - public information should be made available to anyone, and non public information be only made available to those that are allowed access.
As explained in the previous section, the
A
When authenticating clients identified by an http://
(as opposed to https://
) WebID, the server to which the client is authenticating should take into account the potential man-in-the-middle attack or DNS poisoning attacks that may take place when fetching a non secure resource on the Web.
The server to which the client is authenticating should take these attacks into account when deciding what level of service to provide for the user, and also what type of information to allow him access to.
If such a user wants to access sensitive data or enter a serious transaction it may be important to verify his authenticity using additional channels.
For more sensitive transactions, a server authenticating https://
WebIDs may want to make sure that the cert:key
s listed in the
A server to which the client is authenticating must remember that the contents of a
As security is constantly being challenged by new attacks, to which new responses are found, a collection of security considerations will be made available on the WebID Wiki.
2013-08-01 Separated the WebID Identity and Discovery spec from the WebID Authentication over TLS protool. Updated editors and acknowledgments. Reorganised diagram to make clearer that authentication of user should depend on access control rules.
2011-12-12 Fixed several errors in examples and diagrams, clarified TLS-Light, added SSL renegotiation, key chain and cache control, updated list people in acknowledgments.
2011-11-23 Wide ranging changes: Rewrote the Verification algorithm now enhanced with a detailed sequence diagram. Moved to new ontology using xsd:hexBinary datatypes and removed rsa: ontology. Rewrote vocabulary section using clearer names. All these changes required serious rewriting everywhere.
2011-02-10 Move to W3C WebID XG. Updates from previous unofficial WebID group include changes on RDF/XML publishing in HTML, clarification on multiple SAN URIs and WebID verification steps.
2010-08-09
Updates from WebID community: moved OpenID/OAuth sections to separate document,
switched to the URI terminology instead of URL, added "Creating the certificate"
and "Publishing the
2010-07-25
Added
2010-07-18 Updates from WebID community related to RDF/XML support, authentication sequence corrections, abstract and introduction updates.
2010-07-11 Manu Sporny formats protocol with respec for W3C standard look and feel.
2008-09 Bruno Harbulot, Toby Inkster, Ian Jacobi & Henry Story presentation at W3C Workshop on future of Social Networking.
The following people have been instrumental in providing thoughts, feedback, reviews, criticism and input in the creation of this specification: Tim Berners-Lee, Thomas Bergwinkl, Andrei Sambra, Erich Bremer, Sarven Capadisli, Melvin Carvalho, Martin Gaedke, Michael Hausenblas, Kingsley Idehen, Ian Jacobi, Nathan Rixham, Seth Russell, Jeff Sayre, Dominik Tomaszuk, Mo McRoberts, David Chadwick, Patrick Logan, Peter Williams, Mischa Tuffield, Pierre Antoine Champin, Reto Bachman Gmür, Antoine Zimmermann, Manu Sporny.