- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Mon, 20 Dec 1999 18:38:17 -0500
- To: Frederick Hirsch <hirschf@certco.com>
- Cc: w3c-ietf-xmldsig@w3.org, "John Boyer" <jboyer@uwi.com>, David Solo <david.solo@citicorp.com>, "Barbara Fox" <bfox@Exchange.Microsoft.com>
At 16:29 99/12/14 -0500, Frederick Hirsch wrote:
>I have some questions on the XML-Signature core syntax and processing
>document
I'll answer what I can, but I think the other authors could address much of
this better than me.
>I have some questions about signed XML, specifically regarding
>Draft 07-December-1999,
>http://www.w3.org/Signature/Drafts/WD-xmldsig-core-19991207.html
>1. If I wish to not include the OBJECT elements themselves in the
signature for
>the transaction, is the example xpath transform below correct? If so, what
>does the draft mean in section 5.6.3 (Xpath filtering) that the root
>should be included so the result is well-formed? I thought I only want
>to sign the contents of the referenced object element. Is there an
>example available?
In your example, I believe your XPath would grab <txn xmlns=...> which is
the root of that object. You could also give the txn element type an ID and
reference that directly without using the XPath.
>2. For KeyInfo, KeyData, Is it correct to assume a CERTIFICATE element
>for each certificate in the signing party certificate chain? Is it
>correct to specify the encoding for each as an attribute of the
>certificate element?
David, Barbara, others?
>I am assuming that each certificate is base64 encoded (encoding type)
>of the DER encoding.
Yes.
>3. I assume that X.509 oids are not used since they are implicit in an
>XML element. Thus for example, if the signer sends device specific
>information as part of signing, the OID for this information would be
>implicit. Thus if in ASN.1 it is AUTHINFO and an OID, the tag
>SignerDeviceInfo would be enough - if the recipient knows to map this
>to the OID. (I guess I'm asking and assuming OID mapping is
>application dependent).
David, Barbara, others?
>4. In section 3.4, KeyInfo, I note that the spec allows including a
>CRL, with element X509CRL. Can we also define including signed OCSP
>responses, with an X509OCSP element? This would allow transmitted the
>status of the certs with a transaction in an interoperable manner.
David, Barbara, others?
>5. What is the relationship between SignatureAttribute object types
>and SignatureProperties elements, and when is either necessary?
>
>How is the optional type in an ObjectReference element used?
>(section 3.3.3). Does it matter if I have it or not? It seems not to
>matter. (e.g. <Object ID="timestamp"
> type="&dsig;/SignatureAttributes">
>vs <Object ID="txn">
I don't think it matters nor is necessary, but if an application wants to
use it, they could as you have. David?
>Should all signature attribute objects be within SignatureProperties
>elements? I'm a little confused because it looks like properties of
>the signature (e.g. signing time) belong in SignatureProperties, but
>that is not how example 8.0 works. Is there a guideline?
You are correct there is an conceptual inconsistency in the example.
SignatureProperties should only be used for things about the signature, but
we don't specify that all things about a signature must appear in
SignatureProperties. I will tweak that example to use them.
>6. Likewise in the ObjectReference section 3.3.3, I'm not clear what a
>"parent document" is when using the null URL. Does this mean the root
>of the current document or something else?
Yes, the root of the current document, I will make sure we are consistent.
>7. The difference between SignedInfo, Manifest and Package is (to restate)
>SignedInfo - each digest must be validated
>Manifest - each digest may be validated
>Package - each referenced object should be the same after transforms
>are applied (e.g. this is like mirrors for the reference info)
Yes.
>A package may be used as a Object reference within a SignedInfo or
>Manifest, but then only the digest of the manifest (and not the
>content itself is signed.
Yes.
>8. I might suggest adding in the security section (section 7), that in
>the X.509 case, the security also depends on the validity of the signers
>certificate chain, and that if any private key has been compromised the
>document signature is not dependable, so signature validation may only
>be the first step in a process to reduce the risk of depending on the
document.
I hope this is clear given the distinction in the definitions between
signature, core, and application validation in the latest draft.
>9. Section 1.3 refers to the XML namespace xmldsig-core, but the other
>namespaces (e.g. SHA1) include dsig-core. Are they intentionally different?
Well, given they have the same prefix, they are supposed to be seen as part
of the larger namespace. Given that XML-ns don't ascribe any semantics to
the URI, this is our own convention... One could use fragment identifiers
like RDF:
.../xmldsig-core#sha-1
but I think they ran into some problems with that. Would you suggest
something different?
_________________________________________________________
Joseph Reagle Jr.
Policy Analyst mailto:reagle@w3.org
XML-Signature Co-Chair http://www.w3.org/People/Reagle/
Received on Monday, 20 December 1999 18:40:04 UTC