- From: John Boyer <jboyer@PureEdge.com>
- Date: Mon, 28 Aug 2000 17:03:49 -0700
- To: "XML DSig" <w3c-ietf-xmldsig@w3.org>
- Message-ID: <BFEDKCINEPLBDLODCODKEEKNCEAA.jboyer@PureEdge.com>
This might be a no-brainer at this point, but I just noticed that KeyInfo is
not inside SignedInfo.
Why is this?
It seems that during signature generation, all data within KeyInfo can be
filled in prior to generating the SignatureValue. The signer chooses his
identity before the SignatureValue is created.
Otherwise, the material in KeyInfo would seem to be largely untrustworthy
even if our signatures validate. After validation, we would have to dig up
the real information from the actual certificates just to be sure that all
of this identity information wasn't substituted on us by an attacker.
On the other hand, perhaps it is done this way to force application
developers to obtain the information (like subject name) from the
certificate to avoid attacks from those who would generate a faulty
signature.
In which case, why bother breaking this information out into XML?
Thanks,
John Boyer
Development Team Leader,
Distributed Processing and XML
PureEdge Solutions Inc.
Creating Binding E-Commerce
v: 250-479-8334, ext. 143 f: 250-479-3772
1-888-517-2675 http://www.PureEdge.com
Attachments
- image/gif attachment: LINE.gif
- image/jpeg attachment: PureEdge.jpg
Received on Monday, 28 August 2000 20:03:47 UTC