- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Mon, 09 Jul 2001 11:40:18 -0400
- To: "Dournaee, Blake" <bdournaee@rsasecurity.com>
- Cc: w3c-ietf-xmldsig@w3.org
At 22:24 7/6/2001, Dournaee, Blake wrote:
>Thank you very much for this information.
Note, it's a more verbose restatment (with examples) of what is already said
in the spec:
http://www.w3.org/Signature/Drafts/xmldsig-core/Overview.html#sec-See
Some applications might operate over the original or intermediary
data but should be extremely careful about potential weaknesses
introduced between the original and transformed data. This is a
trust decision about the character and meaning of the transforms
that an application needs to make with caution. Consider a
canonicalization algorithm that normalizes character case (lower to
upper) or character composition ('e and accent' to 'accented-e'). An
adversary could introduce changes that are normalized and
consequently inconsequential to signature validity but material to a
DOM processor. For instance, by changing the case of a character one
might influence the result of an XPath selection. A serious risk is
introduced if that change is normalized for signature validation but
the processor operates over the original data and returns a
different result than intended.
>As an aside, there is one other thing that puzzled me regarding XML dsig. In
>one of the examples that you used below, you mentioned Base64 as an encoding
>transform.
That's a mistake. &disg;#base64 is a decode transform, there's no URI yet
for an encode algorithm as there isn't much use for such a thing besides
examples! <smile/> If there was an base64-encode URI, it would be different
than the one I gave.
--
Joseph Reagle Jr. http://www.w3.org/People/Reagle/
W3C Policy Analyst mailto:reagle@w3.org
IETF/W3C XML-Signature Co-Chair http://www.w3.org/Signature
W3C XML Encryption Chair http://www.w3.org/Encryption/2001/
Received on Monday, 9 July 2001 11:40:19 UTC