01:21:50 melvster has quit (Ping timeout: 240 seconds) 02:45:55 bblfish (~bblfish@AAubervilliers-651-1-226-107.w86-198.abo.wanadoo.fr) has joined #dig 02:47:23 bblfish has quit (Remote host closed the connection) 05:28:33 bblfish (~bblfish@AAubervilliers-651-1-226-107.w86-198.abo.wanadoo.fr) has joined #dig 06:05:25 tyteen4a03 has quit (Ping timeout: 245 seconds) 06:18:21 bblfish has quit (Ping timeout: 245 seconds) 06:33:48 bblfish (~bblfish@AAubervilliers-652-1-89-229.w83-114.abo.wanadoo.fr) has joined #dig 06:41:41 tyteen4a03 (tyteen4a03@2001:470:e2e4::) has joined #dig 07:04:42 bblfish has quit (Remote host closed the connection) 07:14:50 bblfish (~bblfish@AAubervilliers-651-1-226-107.w86-198.abo.wanadoo.fr) has joined #dig 07:16:41 bblfish has quit (Remote host closed the connection) 07:28:44 bblfish (~bblfish@AAubervilliers-651-1-226-107.w86-198.abo.wanadoo.fr) has joined #dig 07:40:40 deiu (~andrei@157.159.103.113) has joined #dig 07:40:40 deiu has quit (Changing host) 07:40:40 deiu (~andrei@unaffiliated/deiu) has joined #dig 07:43:34 bblfish has quit (Remote host closed the connection) 08:40:47 jmvanel (~jmvanel@199.0.88.79.rev.sfr.net) has joined #dig 09:12:13 Yudai_ has quit (*.net *.split) 09:12:16 sandro has quit (*.net *.split) 09:20:15 sandro (~sandro@ssh.w3.org) has joined #dig 09:20:15 Yudai_ (~Yudai@nttkyo218001.tkyo.nt.ngn2.ppp.infoweb.ne.jp) has joined #dig 09:31:26 timbl (~timbl@host86-146-148-68.range86-146.btcentralplus.com) has joined #dig 09:45:36 bblfish (~bblfish@90.24.245.239) has joined #dig 09:45:52 melvster (~melvster@89.176.108.70) has joined #dig 10:20:20 bblfish has quit (Remote host closed the connection) 10:20:53 bblfish (~bblfish@90.24.245.239) has joined #dig 10:25:54 bblfish has quit (Ping timeout: 276 seconds) 11:00:14 deiu has quit (Read error: Connection reset by peer) 11:00:42 deiu (~andrei@unaffiliated/deiu) has joined #dig 11:24:18 RalphS (rswick@w3cvpn1.w3.org) has joined #dig 11:48:44 bblfish (~bblfish@90.24.245.239) has joined #dig 12:06:36 bblfish has quit (Remote host closed the connection) 12:08:56 bblfish_ (~bblfish@90.24.245.239) has joined #dig 12:25:53 bblfish_ has quit (Remote host closed the connection) 12:29:51 presbrey? 12:30:20 bblfish (~bblfish@90.24.245.239) has joined #dig 12:30:38 Seems that when spawning a new tracker, I'm getting 200 back from the PUT but no actual data stoted 12:32:02 e.g. http://timbl.data.fm/test/issuetracker.w3.org/1378748362742/track should have bunch of triples in 12:33:31 This happens whether using the code for making a new tracker, or just curl -v --upload-file foo2.n3 -HContent-type:text/turtle http://timbl.data.fm/test/issuetracker.w3.org/1378748362742/track 12:42:36 timbl, about your last question regarding rww.io and data.fm, they should be merged (maybe replace data.fm with rww.io since it brings lots of new features) 12:44:40 rww.io should support the old ACL convention (.meta in the / dir), but I need to check with presbrey and test it 12:49:59 By merge, that would leave the source trees the same. Just get the best of both' 12:50:23 When it comes to the .meta .acl etc 12:50:50 the main thing is that there is a common protocol -- and a common client-ide library -- that works with either way. 12:51:41 So it shouldn't matter what the filename is, but it should matter that client find s it in a standard way 12:56:28 scor (scor@drupal.org/user/52142/view) has joined #dig 12:58:20 bblfish has quit (Ping timeout: 245 seconds) 12:58:47 bblfish (~bblfish@90.24.245.239) has joined #dig 13:01:50 timbl, wouldn't it be useful to have a CG/WG to discuss Web ACL stuff? 13:02:02 (If I try it with rww.io I get a 403) 13:02:32 the goal is to standardize WebACL discovery and management 13:02:35 DO you think the Web ACL stuff should be in a separate list, nonpublic-rww ? 13:02:50 I think it's part of the RWW CG now, right? 13:04:37 are you trying to upload foo2.n3 to rww.io? 13:05:19 yes 13:05:34 just s/data.fm/rww.io/ above 13:06:28 How can I set that up for public access -- how can I get at my ffox cert and do webid with curl? 13:06:57 you can export the cert as pem 13:07:29 then use curl --cert or curl -E 13:09:30 BTW, you need to set the acl for /test before writing to it as a public user 13:10:09 open the UI and tick the Write and Default for new checkboxes 13:10:28 might as well give it Read too 13:11:08 hmm or Append instead of Write (can PUT new resources with it) 13:12:10 Somethimng which starts -----BEGIN CERTIFICATE----- is a .pem ? 13:12:18 yes 13:13:44 so curl -v -E timbl.pem 13:13:49 that should work 13:14:03 I still get 403 .. so if I make an ACL on /test/ that will be enough? 13:14:25 did you export the cert with a password? 13:14:37 in that case: curl -v -E timbl.pem:password 13:15:01 or set some default ACL rules for /test/ 13:15:40 oh, you're using a http:// url 13:15:49 you might want to use https:// to trigger WebID auth 13:16:43 ooops yes. 13:16:47 Ok now I get unable to set private key file: 'timbl.pem' type PEM 13:18:23 did you convert the cert from .p12 to .pem yourself? 13:18:50 That is just what you get from the Firefox export button 13:18:51 I think FF exports a password protected .p12 by default 13:18:55 I din't change it 13:20:03 I'm not sure how it behaves on OS X 13:22:56 do the thing starting -----BEGIN CERTIFICATE--- might be a p12 not a pem ? 13:24:28 I exported a cert using FF and it doesn't have that line (BEGIN CERT..) 13:24:58 can you use check if this command works? openssl pkcs12 -in file.p12 -out file.pem 13:25:08 replace file.p12 with your cert 13:26:23 No, not happy 13:26:24 140735183428028:error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag:tasn_dec.c:1319: 13:26:25 140735183428028:error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error:tasn_dec.c:381:Type=PKCS12 13:26:51 expecting a raw ASN/1 file maybe 13:27:10 cheater__ (~cheater@p5498A868.dip0.t-ipconnect.de) has joined #dig 13:27:44 try: openssl x509 -text -in timbl.pem 13:27:52 does it print the cert correctly? 13:28:35 Yes 13:28:43 then it's definitely a pem 13:29:14 (includeing URI:https://webid.mit.edu/timbl#) 13:29:28 did you set a password when you exported it? 13:29:55 No 13:30:20 curl would shave prompted I think 13:30:41 I think you might have exported only the public key 13:31:54 I find it strange that FF didn't ask for a password, or that it exported by default as PEM 13:33:33 Ah I'd missed the export format option opn FFox export button 13:33:52 the default is "X509 cert (PEM)" 13:34:18 There is another option X509 cert (PEM) (with chain)" 13:36:16 yes the dump of the cert does not have private key info 13:38:06 does it work now? 13:39:29 I haven't found anything to change. exporting wit the chain gives the same file 13:40:27 what FF version are you using? 13:41:37 23.0.1 13:41:48 I have the same version 13:42:24 I'm doing Preferences -> Advanced -> Certificates -> View Certificates -> Backup... 13:43:47 I was doing View button to get to one cert, then "detail" tab the "expert" button 13:43:52 export 13:44:06 ah 13:44:10 use the Backup... button 13:44:35 export will only save the public key 13:44:45 That will include al 3 certs and male a p12 13:45:20 then you can convert the p12 to pem using: openssl pkcs12 -in file.p12 -out file.pem 13:47:05 ok 13:48:43 I see .. I though it would backup all 3 but it only does the selected one 13:49:53 I think you have a Backup All for that :-) 13:50:03 Nice. * We are completely uploaded and fine 13:50:51 https://webid.mit.edu/timbl# 13:51:15 from the "User:" field 13:51:30 so it works 13:51:39 Is that field a webid standard as it were … can the tabulator client code look for it? 13:51:46 Yes, it works 13:52:07 it's not a standard but I would REALLY want for it to be 13:52:34 otherwise I don't know how a web app can tell if the user is authenticated or not 13:53:08 and User: should be protocol-independent 13:53:20 Well, if your an program the browser, the bit is easy as yo know which cert you are wielding …. and of course a user can have different certs on different stores. 13:53:46 you can't access the cert info in all browsers 13:54:24 So we have to be careful of jumping through too many hoops to do things you could do easily programming the cb=broswre, and ten eth browser manufacturers saying that the protocol is unncesessailty complicated 13:54:27 :-) 13:55:07 bblfish has quit (Remote host closed the connection) 13:56:18 but you still need a way to get feedback from the server regarding which identity is currently "logged in" 13:56:27 Yes. 13:56:54 But the client in principle knows. It is just the browser knows, not the webapp 13:57:00 or the extension. 13:57:48 what if the authentication failed? the browser still knows it used the cert for https://webid.mit.edu/timbl#, but it doesn't mean the server has logged the user in 13:58:27 the cert is selected in the browser, but the user has failed to login on the server 13:58:50 Well, I think the "User:" is useful anyway. 13:59:29 it's a hack 14:00:14 why? 14:01:35 it's not a standardized header 14:01:35 bblfish (~bblfish@90.24.245.239) has joined #dig 14:01:36 In the webid spec it can be. 14:02:17 ANy architectural reasons its a hack? 14:02:26 not really 14:02:44 I suppose we can mention it in the WebID-TLS spec 14:03:16 I find it really useful for web apps 14:03:54 yes 14:04:21 the tabulator has 'me' preference which it uses but the user has to sit themsleves 14:04:47 I could, anytime a "User" URI is seen, change that. 14:06:16 would it be more useful to have a Link rel=identity header? 14:06:45 I think the link rel= express relationships between the document and other things. 14:06:54 The currently logged in user is to that 14:07:03 is not that. 14:07:08 true 14:07:53 (entity headers and protocol headers or something) 14:15:22 speaking of link rel, rww.io HTTP responses contain a link=acl for the .acl file and a link=meta for the .meta file (if the resource is not an RDF document) 14:35:50 tyteen4a03 has quit (Ping timeout: 245 seconds) 14:46:15 betehess has quit (Ping timeout: 245 seconds) 14:47:23 tyteen4a03 (tyteen4a03@2001:470:e2e4::) has joined #dig 14:48:04 betehess (~betehess@2001:470:8b2d:804:4451:91a6:5716:e8cc) has joined #dig 14:49:10 is there any client code for changing ACLs ? 14:51:39 deiu? 14:52:09 no, the web app should handle that 14:52:16 I have made a new tracker now using the tracker ane 14:52:20 pane 14:52:25 at http://timbl.rww.io/test/issuetracker.w3.org/1378824620728/track#TabTracker 14:52:43 but that file gets returned with a syntax error 14:53:43 Extra dots 14:54:02 <#Bug> 14:54:03 a ; 14:54:04 "bug" ; 14:54:05 <#TabIssueCategory> ; 14:54:06 "#fffed0" ; 14:54:07 70. . 14:54:21 An extra trailing dot 14:54:30 Which serializer are you using? 14:54:53 It isn't generaing prefixes 14:55:58 I'm using rdflib 14:56:12 that extra dot is weird 14:56:18 it's the first time I see it 14:56:53 it seems to appear only after an integer value 14:56:58 Oh… I think it may be decimal 14:57:07 missingt trailing 0 14:57:16 yes 14:57:21 maybe syntax ambiguity 15:08:20 betehess has quit (Ping timeout: 245 seconds) 15:22:48 betehess (~betehess@31-35-251.wireless.csail.mit.edu) has joined #dig 15:36:17 deiu has quit (Quit: Leaving) 15:59:02 timbl deiu: User: is on it's way to becoming a standard ... I've done some consensus gathering with mnot, roy, nathan, kingsley, manu, the rww group and the openid foundation 15:59:18 people were asking for use cases, so I'll write some up 15:59:42 the feedback was *not* to reuse the "From: " header as that is for email only 16:00:32 unofficially I think it's OK to use, there were suggestions of calling it UserID too, but I think User is just about winning the naming, and it's already in use in data.fm implemented by presbrey 16:00:58 I plan to make a wiki page, we have text already, then try and submit it to the IETF registry for feedback 16:01:20 What's the best approximation of a webs spec just now? 16:01:42 "webs spec" ? 16:02:13 webid spec 16:02:15 deiu (~andrei@2a01:e35:8b67:4160:2d92:4f6a:612a:a1c1) has joined #dig 16:02:15 deiu has quit (Changing host) 16:02:15 deiu (~andrei@unaffiliated/deiu) has joined #dig 16:02:19 stupid autocorrect 16:03:08 timbl: https://dvcs.w3.org/hg/WebID/raw-file/tip/spec/index.html 16:03:38 henry wants to publish it next week to it's home at: http://www.w3.org/2005/Incubator/webid/spec/ 16:03:42 cc bblfish 16:05:43 Should User: not be aded as a should to WebID-TLS? 16:05:56 or WebID? 16:07:31 cheater__ has quit (Ping timeout: 245 seconds) 16:07:50 timbl: in WebID-TLS you get the user from the SubjectAlternativeName ... adding User sounds to me like a good idea, but not sure what the group's opinion on that would be ... 16:08:45 in fact the subject alternative name can contain a list of multiple user URIs 16:08:49 timbl, I'll try to put together and propose a paragraph about User: 16:09:06 deiu: I'd be happy to work with you on that ... I already have text for it 16:09:13 melvster, I think timbl is referring to the User: header 16:09:16 yes 16:09:26 brb 16:10:20 DIGlogger, pointer 16:10:20 See http://dig.csail.mit.edu/irc/dig/2013-09-10#T16-10-20 16:12:30 scor has quit (Ping timeout: 245 seconds) 16:14:51 Or should it be added to WebID so that the User: field is given whatever the auth method used? 16:15:38 Yes I'm talking about a User: HTTP header which I notice I get from rww.io 16:15:43 and I like (!) 16:16:33 scor (scor@nat/acquia/x-epgddxragswxqrhj) has joined #dig 16:16:33 scor has quit (Changing host) 16:16:33 scor (scor@drupal.org/user/52142/view) has joined #dig 16:19:00 IMO, the User: header should not be part of the WebID spec 16:19:16 it should be protocol-independent 16:19:45 there should be a "RWW" spec about these things 16:19:59 timbl: User is also useful without auth, I could personalize a page for you, auto filling in many fields without you having to type things on a mobile device, I could also add your name and avatar, and find information from your preferences ... with auth it of course can act as a username 16:20:54 and also when you try and *change* something, you need auth or when you access *protected* information 16:21:37 melvster, I don't understand 16:22:15 personalize a page when you pretend to be someone else? 16:22:45 deiu: im only talking about leveraging public information from your profile here 16:23:25 User: is returned by the server, not sent by the agent 16:23:37 oic 16:24:10 hmmmmm 16:24:15 it's the server's way of indicating that your request was performed based on that particular identity (which is set in the User header) 16:24:37 cant the request send user too? 16:24:45 why? 16:25:01 isn't that what authentication does? 16:25:08 no! 16:25:17 authentication and identification are different things 16:26:04 as a server, I have no incentive to personalize (= spend time/resources) a page if I'm not sure I'm doing it for the right person 16:26:31 besides, identification without proof is wrong 16:26:47 in your use-case at least 16:28:35 deiu: it's how communication works in every field, you identify, and only authenticate on demand ... imagine that it was impossible to write someone a letter without proving your identity? 16:28:50 or phoning someone up 16:29:11 identity and authn are modular concepts 16:31:30 deiu: to put it another way, why would anyone want to identify themselves as the *wrong* person? 16:31:47 melvster, in your example, you are basically saying that you want the server to display a page and personalize it as if you were timbl 16:32:28 deiu: i didnt say I *want* that ... I said it's a possible use case for the server to use public information associated with a URI, e.g. to auto fill forms 16:32:46 like credit card information forms? :-) 16:33:05 or full name / address info? 16:33:14 deiu: do you keep your credit card details public? ;) 16:33:28 no, but the server may save them 16:33:41 anyway 16:33:46 There are two things 16:33:52 I think your use-case is not complete 16:34:07 there's information something missing 16:34:35 besides, browsers already do autocomplete 16:34:58 One is the user id the user has authenticated with tho the server through the client. The other is the person the clinet understands the users to be, which affects certain data, like stuff about people, where the display will be user-related -- like "You are friends with x". 16:35:47 timbl: right, that's used in the social and microblogging panes 16:36:51 who sends the second one? 16:40:05 The second one is set by the user with the "login in" code where it prompts for awe did if you don't have a browsing id 16:40:14 It isn't sent over the net 16:40:22 it is local to the client and the user 16:41:04 The user agent needs to know whop the user is because it has to start with a lot of user preferences 16:41:19 including which workspaces a user has available, fav language, etc etc 16:41:56 Baically like a unit home directory allow you to look up ~/.xxx rc and ~/.xxx.config etc 16:42:45 so the second one is bound to the application 16:42:48 In this experimental workspace ontology here is a pointer from th user's public ID to the private preferences file. 16:43:21 in other words, it's part of the local preferences 16:43:30 timbl: can preferences be public too? 16:43:40 http://www.w3.org/ns/pim/space#preferencesFile 16:43:47 It could be public 16:43:55 but I wouldn't want mine to be 16:44:02 as it points to private worspaces 16:44:06 yes 16:44:16 I'm just trying to see if/how this can be abused 16:45:01 If everyone's pref file is in a similar place then the URI of the file itself should not give much away 16:46:40 Not like <#me> space:preferencesFile . 16:47:22 At the moment I cheat -- I have one on /localhost 16:47:37 so the link will confuse others 16:47:40 you could have an acl for it though 16:47:50 yes. 16:48:05 definitely have an cal for it. 16:48:13 s/cal/acl/ 16:49:01 I see 16:49:04 ontology look great: public / private / shared ... that should cover most use cases ... 16:49:30 bblfish has quit (Remote host closed the connection) 16:49:50 BTW, are these workspaces per application or "shared" between apps? 16:50:26 could be either I imagine, the ontology doesnt forbid sharing 16:50:43 would a calendar app be able to GET data from an agenda app? 16:51:07 It will probably be a good idea to shave a bit of code which juts sets up a preferences file and a set of workspaces 16:51:25 A trusted app can get any data a user can access 16:51:57 "shared" for a workspace is 16:52:04 shred between users. 16:52:27 aha 16:52:37 longer term, I think apps should have finer grained permissions, so that it's not necessarily all or nothing 16:52:40 Current thinking about string is between apps is we have spaces which are app-specific and places which are standardizes 16:53:01 do e.g. a map space any mail client can read and write to. 16:53:08 I was thinking about cross-app workspaces 16:54:05 I think we need delegated credentials in that case where the app has it's own identity and you tell it what it can or cant access, much like OAuth does for facebook / google+ etc. 16:54:10 or workspaces dedicated to specific types of resources -- i.e. a photo album app will ask permission to access your "photos" workspace 16:54:29 Two modes, one its you have a cross-app space, the oethr is that one app starts using its own space (like the tracker does) and others just peek into that and join in 16:54:33 extending it. 16:54:45 yes, like the gps app 16:55:22 delegated credentials -- yes -- well, I think I need to be abel to say "I will allow Melvin to access this data only with this application". 16:55:26 "Please indicate where I can save my files" kind of question 16:55:53 Ihave that sort of code written 16:57:25 granting access based on a specific app is difficult 16:57:50 If you make a preferences file like http://pastebin.com/9aExuKW0 16:57:56 it forces users to use app X over Y 16:58:41 well yes but what do you do when someone want to use an app off he web which will steal your data like an iPhone free weather app steals you calendar as a privacy invasion? 16:58:57 An arbitrary app might be maliceious 16:59:01 timbl, that's the million $ question 16:59:08 or it might "just" steak private at a. 16:59:19 steal 16:59:24 A trusted app won't 16:59:33 I only trust apps I write myself :-) 16:59:36 A trusted app isbenificent. 17:00:26 well, I think this problem affects any kind of software system, even outside the Web 17:00:57 Yes. 17:00:59 you can have a trojan that sends data away, even if you use a trusted app 17:01:12 BUttraditionally all software loaded on your computer was beneficent. 17:01:53 BTW, a trust app also means some sort of trusted app store 17:02:00 s/trust/trusted 17:02:25 Beneficent here meaning roughly "would do what the user would normally be expected to want it to do if it had time to ask th user" -- i.e. no ads 17:02:57 I think for me yes useful to have atrusted app store but the installation process is important 17:03:30 being able to install the app locally is very important 17:04:03 Yes. I may be able to e.g. set up a set of githb users which I assume are beneficent nd if they have checked stuff in my client will run it with less of a installation hurdle for example. 17:04:03 you can audit the app yourself and make sure you can trust it, since the code won't change 17:04:14 You can also set up a review process. 17:04:28 You can sign a cert for a given hit hub hash 17:04:50 (which is feet in that it can be verified locally to still give the same hash I assume) 17:05:00 I need to find a company to found me so I can work on it :-) 17:05:01 s/feet/sweet/ 17:05:11 s/found/fund/ 17:06:13 right now it would be great to have an app manifest vocabulary 17:06:30 otherwise you can't know what to expect from the app 17:07:58 it's great that we have data.fm / rww.io as a base where people can install apps 17:10:01 maybe I can package rww.io for debian, so people can install it everywhere 17:12:36 http://www.hhs.gov/ohrp/policy/belmont.html#xbenefit 17:13:06 where I came across the word beneficent 17:13:37 I don't want data.fm code and rww.io code to get too far apart 17:14:16 isn't presbrey working on a python implementation of data.fm? 17:14:46 it may be possible to bootstrap the mozilla marketplace : https://marketplace.firefox.com/ 17:15:46 they have a really nice manifest system 17:16:01 it can easily be transformed into an ontology 17:17:35 I think presbrey might prefer everyone to switch to python 17:18:46 https://github.com/linkeddata -> https://github.com/linkeddata/ldpy 17:19:07 I would like that too 17:19:27 deiu: there's a community group working on manifests, w3c has some work in this area e.g. widgets 17:19:57 YEs, a whole spec which wasn't adopted. 17:20:30 timbl: it's a pity, w3c widgets looked like a great spec 17:22:26 perhaps it will be a good excercise to bootstrap the mozilla market place so that it's possible to install apps into a framework like tabulator 17:23:27 most apps are free and dont require auth, which is nice ... and on unity they can even be downloaded as standalone desktop apps 17:24:57 Hmmm the code in https://github.com/linkeddata/ldpy/blob/master/ld.py may be a one-file solution 18:08:24 zuzak has quit (Quit: Reconnecting) 18:08:31 Zuzak (~zu@2001:ba8:1f1:f2f5::2) has joined #dig 18:08:31 Zuzak has quit (Changing host) 18:08:31 Zuzak (~zu@pdpc/supporter/professional/zuzak) has joined #dig 18:09:07 Zuzak is now known as zuzak 19:01:21 scor has quit (Ping timeout: 276 seconds) 19:04:32 jmvanel has quit (Ping timeout: 260 seconds) 19:05:05 scor (scor@drupal.org/user/52142/view) has joined #dig 19:08:23 jmvanel (~jmvanel@199.0.88.79.rev.sfr.net) has joined #dig 19:48:02 bblfish (~bblfish@AAubervilliers-651-1-226-107.w86-198.abo.wanadoo.fr) has joined #dig 20:05:36 cheater__ (~cheater@p57AEA1E6.dip0.t-ipconnect.de) has joined #dig 20:17:28 timbl has quit (Quit: timbl) 20:18:01 RalphS has quit () 20:24:56 deiu has quit (Quit: Leaving) 20:58:23 timbl (~timbl@host86-146-148-68.range86-146.btcentralplus.com) has joined #dig 21:08:45 jmvanel has quit (Ping timeout: 276 seconds) 21:16:43 scor has quit (Quit: scor) 21:24:09 scor (scor@drupal.org/user/52142/view) has joined #dig 21:24:31 scor has quit (Client Quit) 23:12:46 bblfish has quit (Remote host closed the connection) 23:21:15 betehess has quit (Ping timeout: 245 seconds)