On 4 Mar 2010, at 00:29, Caleb James DeLisle wrote:
I just installed and ran the application. It generates
RSA keys with SHA1 hash and PKCS #1 padding scheme. In Firefox it will generate 2048 bit
keys but Opera will generate keys up to 4096 bit.
The keys are good for signing and cryptographic negotiation and expire after 1 year.
The form could ask the user how long he wants his certificates to last for. Currently the
default is one year, but its a simple matter of tweaking the velocity to have that be
anything else. Perhaps we should make the default shorter.
A test form to play around with these options is available on the WebId.CreateCert page.
Firefox and Opera Javascript have a method crypto.signText() which apparently will
support signing of form data on the client side which has a wide array of use cases
including signing XWikiDocuments in so they can be imported and exported while retaining
their author field.
see:
http://docs.sun.com/source/816-6152-10/sgntxt.htm
that sounds very interesting...
Currently there is no component in the application for validating keys, only creating
them.
I was going to work on the login component next... There is a page of some of the services
that one can use to login to here:
http://esw.w3.org/topic/foaf+ssl/RelyingParties
This should be growing quickly as Tim Berners Lee has been backing this effort more
visibly recently. Today he gave a talk entitled
"Distributed Social Networking
Through
Socially Aware Cloud Storage"
http://www.w3.org/2010/Talks/0303-socialcloud-tbl/
Which places WebIds and foaf+ssl at the center of the architecture.
With some notes taken here:
http://www.w3.org/2010/03/03-swxg-minutes.html
Here's my +1 for adding to the incubator and
continuing to explore use cases.
Thanks :-)
As most of this is velocity code we should be able to tweak it when its up on the
incubator site.
One thing I thought would be very nice would be to add the following lines to the header
<link rel="openid.server" href="http://openid4.me/index.php" />
<link rel="openid2.provider openid.server"
href="http://openid4.me/index.php"/>
<link rel="meta" type="application/rdf+xml" title="FOAF"
href="your_foaf_file"/>
Every profile page would as a result become an OpenId backed by foaf+ssl.
There are a few problems though with this, so we can't do it immediately:
- I don't know how to add those to the headers from the XWikiUserProfileSheet page
- openid4.me requires a pointer to an rdf/xml foaf file for the moment. I'll ask them
to tweak their code so they can accept html marked up with rdfa
- the home page urls are currently too long to make useful OpenIds. To be typable they
should be something like
http://xwiki.org/bblfish or
http://xwiki.org/p/bblfish
So lots more fun stuff to come...
Henry
Caleb
Story Henry wrote:
I placed the jar and xar here:
http://bblfish.net/tmp/2010/02/xwiki/
to make it simpler. Though git is quite easy to get btw. For OSX I found it here
http://code.google.com/p/git-osx-installer/
The README for installation is online here:
http://github.com/bblfish/keygenapp/blob/master/xwiki/README.txt
Henry
On 25 Feb 2010, at 19:16, Vincent Massol wrote:
Just to be clear:
+1 from me to deploy it on
incubator.myxwiki.org
If I can get one or 2 more +1 then I could help Henry deploy it and give him the rights
for incubator.
Thanks
-Vincent
On Feb 24, 2010, at 10:15 AM, Vincent Massol wrote:
> Hi Henry and all,
>
> On Feb 23, 2010, at 7:52 PM, Story Henry wrote:
>
>> Hi,
>>
>> I have built a little keygen application for Xwiki now. It is available here:
>>
>>
http://github.com/bblfish/keygenapp
>>
>> You can download it with
>>
>> $ git clone git@github.com:bblfish/keygenapp.git
_______________________________________________
devs mailing list
devs(a)xwiki.org
http://lists.xwiki.org/mailman/listinfo/devs
_______________________________________________
devs mailing list
devs(a)xwiki.org
http://lists.xwiki.org/mailman/listinfo/devs