- From: Frederick Hirsch <frederick.hirsch@nokia.com>
- Date: Tue, 5 Jun 2007 08:26:32 -0400
- To: XMLSec <public-xmlsec-maintwg@w3.org>
- Cc: Hirsch Frederick <frederick.hirsch@nokia.com>, ext Juan Carlos Cruellas <cruellas@ac.upc.edu>
Correction, this should close ACTION-42. (Sending message so tracker
associates with action note.)
regards, Frederick
Frederick Hirsch
Nokia
On Jun 1, 2007, at 1:01 PM, ext Juan Carlos Cruellas wrote:
>
> Dear all, this should complete action 41. Sorry for the long message.
>
> Dear all,
>
> If we asume that by default is implicit that no matter the fact
> that RFCs 2253 and 4515 speak about allowing
>
> plain '<' in the string, the XML rule that any '<' within a node
> text must be escaped, then I concur that
>
> this is not an issue. Maybe a note warning about this fact could be
> worth....
>
> As for the CDATA section vs. node text, I have read somewhere that
> in fact the CDATA section is a kind of
>
> convention that applications should know and treat as a node text
> except by the fact that escaping as defined
>
> by XML is not required there. My understanding of what I read is
> that this not require even a xml schema
>
> change (although I could be wrong: I am not sure, but I have not
> found any mention to CDATA sections in the
>
> XML Schema specs -I found mention to CDATA type but at first
> reading it does nothing to do).
>
> Nevertheless, after re-reading RFCs 2253 and 4515, I think that we
> could have still a different issue. The
>
> origin of this discussion are the different elements within
> X509Data that, according XMLSig, should allow to
>
> identify a certain certificate. One of these means is the pair
> X509IssuerName, X509SerialNumber.... I propose
>
> to give a thougth to the string representation and asses whether
> this might make it unfeasible the
>
> identification of a certificate given the X509IssuerName.
>
> TheRFCs themselves provide a clear warning in sectin 7.2 of RFC
> 2253, and 5.2 of RFC 4514 (Use of
>
> Distinguished Names in Security Applications):
>
> " The transformations of an AttributeValue value from its X.501
> form to
> an LDAP string representation are not always reversible back to the
> same BER or DER form. An example of a situation which requires the
> DER form of a distinguished name is the verification of an X.509
> certificate.
>
> For example, a distinguished name consisting of one RDN with one
> AVA,
> in which the type is commonName and the value is of the
> TeletexString
> choice with the letters 'Sam' would be represented in LDAP as the
> string CN=Sam. Another distinguished name in which the value is
> still 'Sam' but of the PrintableString choice would have the same
> representation CN=Sam.
>
> Applications which require the reconstruction of the DER form of
> the
> value SHOULD NOT use the string representation of attribute
> syntaxes
> when converting a distinguished name to the LDAP format. Instead,
> they SHOULD use the hexadecimal form prefixed by the octothorpe
> ('#')
> as described in the first paragraph of section 2.4.
> "
>
> I read this as that it looks like if people use regular strings
> (CN=John....) instead the scaped octet
>
> representation preceded by the dot representation of the OID,
> applications could not rebuild the orignial DER
>
> encoding Distinguished Name and not find the certificate.
>
> On the other hand, if the method is the contrary, i.e. to convert
> the Distinguished Name of the certificates
>
> to be inspected to String using the RFC 2253 / 4514, still seems
> that there are possibilities for getting
>
> different strings.
>
> RFC2253 (section 2.3) when speaks about converting the
> AttributeTypeAndValue says:
> "If the AttributeType is in a published table of attribute types
> associated with LDAP [4], then the type name string from that table
> is used, otherwise it is encoded as the dotted-decimal encoding of
> the AttributeType's OBJECT IDENTIFIER. The dotted-decimal
> notation is
> described in [3]. As an example, strings for a few of the
> attribute
> types frequently seen in RDNs include:...
> "
> And gives an example table... and I wonder about hte possibility
> that a generating application uses some a
>
> short name that the verifying application does not know and then
> how this one could actually match both
>
> strings?
>
> RFC 4514 has introduced some changes. In section 2.3 speaks about a
> registration process of short names
>
> (descriptors) managed by IANA, but in its sectin 3 it gives a table
> and says:
> "Implementations MUST recognize AttributeType name strings
> (descriptors) listed in teh following table, but
>
> MAY recognize other name strings" and later on :
>
> " Implementations MAY recognize other DN string representations.
> However, as there is no requirement that alternative DN string
> representations be recognized (and, if so, how), implementations
> SHOULD only generate DN strings in accordance with Section 2 of
> this
> document.
> "
>
> In summary, I wonder whether we should think a bit more on giving
> some guidance that would avoid this problem
>
> of identifying the referenced certificate by a X509IssuerSerial
> element.
>
> Sorry if I raise some issue that was already discussed in the
> XMLSig WG (and if so, please forget it) and also for this long message
>
>
> Juan Carlos
>
Received on Tuesday, 5 June 2007 12:26:50 UTC