- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Wed, 21 Feb 2001 18:50:56 -0500
- To: "Carl Ellison" <cme@acm.org>
- Cc: "TAMURA Kent" <kent@trl.ibm.co.jp>, w3c-ietf-xmldsig@w3.org, kent@trl.ibm.co.jp, bal@microsoft.com, cwallace@erols.com
Carl: I'm not sure if you argument is for multiple elements in general
(which is already permitted), or the possibility of multiple KeyValues
(which we are discussing, and I thought you previously opposed)?
I think I personally agree with Kent's point that given our semantics, you
would only have one KeyValue: you only have on KeyInfo. Brian mentioned a
change might damage dependent specs (XKMS) so I went to look at it [1] again
wondering when this is the case. However, I don't see any of the examples
using more than one KeyValue within a KeyInfo. I'm presuming the scenario is
where one does a query and gets a couple keys back, but I presume you'd get
more than one KeyInfo back. You don't have more than one KeyInfo in a
Signature because the structure was designed to exchange key information
necessary to validate, not generic key exchange. This can be easily remedied
in XKMS or other applications as Kent suggests.
<foo:Keys>
<ds:KeyInfo>
<ds:KeyValue>...</ds:KeyValue>
</ds:KeyInfo>
<ds:KeyInfo>
<ds:KeyValue>...</ds:KeyValue>
</ds:KeyInfo>
</foo:Keys>
Brian: could you give us a specific scenario?
Kent: do you have a schema/dtd in mind that would express this constraint?
[1] http://www.verisign.com/rsc/wp/xml/xkms_spec/xkms_spec_wp.pdf
At 03:39 2/21/2001 -0800, Carl Ellison wrote:
> >4.4 The KeyInfo Element, 2nd paragraph:
> >>> Multiple declarations within KeyInfo refer to the same key.
> >
> >Multiple KeyValue elements in a KeyInfo element make no sense
> >according to this sentence. If one wants to transfer multiple
> >keys at once, one should define container element, that includes
> >multiple KeyInfo elements.
>
>I can imagine the key info to back up use of a single key, not just the raw
>key. We already provide for a variety of certificate forms in KeyInfo. If
>you have certificates, you usually need one or more chains of them for the
>end certificate to be useful. You might even need multiple end certificates
>on the same key. For example, you might have my Intel key, with an X.509
>certificate issued by Intel IT department and binding my World-Wide ID Number
>to that key (WWID being Intel's only unique name for us) -- but in order to
>make a security decision on the signed message in question, the DSig might
>also need to contain an SPKI certificate (or certificate chain) whose (final)
>subject is that key, empowering it in some way.
>
>To me, that calls for multiple elements.
__
Joseph Reagle Jr. http://www.w3.org/People/Reagle/
W3C Policy Analyst mailto:reagle@w3.org
IETF/W3C XML-Signature Co-Chair http://www.w3.org/Signature
W3C XML Encryption Chair http://www.w3.org/Encryption/2001/
Received on Wednesday, 21 February 2001 18:51:38 UTC