- From: Mike Just <Mike.Just@entrust.com>
- Date: Mon, 3 Dec 2001 08:33:23 -0500
- To: "'Dournaee, Blake'" <bdournaee@rsasecurity.com>, www-xkms-ws@w3c.org
- Message-ID: <9A4F653B0A375841AC75A8D17712B9C980F5C4@sottmxs04.entrust.com>
Hi Blake, I remember reading this from the 1.1 draft as well. My interpretation was that Phil was giving an example of a particular X-KRSS service's policy (i.e. Joe's X-KRSS Web Service policy) rather than something general that applied to all key recovery requests. Mike -----Original Message----- From: Dournaee, Blake [mailto:bdournaee@rsasecurity.com] Sent: Sunday, December 02, 2001 4:28 PM To: www-xkms-ws@w3c.org Subject: Question about XKMS 2.0 Hello All, I have been reading through the XKMS draft and noticed the following sentence in the Key Recovery sub-section (after the first example) under the Key Registration Service Protocol Overview: "The registration service policy is to revoke a private key whenever key recovery is performed." I don't understand this. If I am performing key recovery, what use is it to to revoke the key? This means I wouldn't be able to perform any signing operations (although I could decrypt messages sent to me). Does key recovery always imply key revocation for XKMS? Thanks, Blake Dournaee Toolkit Applications Engineer RSA Security "The only thing I know is that I know nothing" - Socrates -----Original Message----- From: Mike Just [mailto:Mike.Just@entrust.com] Sent: Friday, November 30, 2001 12:05 PM To: 'Jeremy Epstein'; www-xkms-ws@w3c.org Subject: RE: URL-level trust (was: Re: XKMS) Hi Jeremy, A comment on your last point. > So I think it's important that a given XKMS server needs a > way of providing > different grades of service to its clients. I don't know whether this > should done by the client saying "please validate this > certificate as a > grade 73B certificate" or whether the XKMS server should > recognize a request > as coming from the business payments server and hence enforce > a different > certificate policy. If the former, the protocol needs some way of > expressing a request for a policy ("grade 73B"), but *not* > sending a list of > trusted root certificates. If the latter, it's a feature of the XKMS > server, and probably doesn't need to be standardized (i.e., > the XKMS server > could determine the trusted roots to use based on the signature on the > request). > It seems that there is a convergence toward accepting that the "policy" or "context" or "trust model" can be specified by reference as part of the request. Whether this is as part of the URL and/or part of the X-KISS request is another question; as part of the URL is probably fine though. You raise another interesting point regarding validation based on the origin of the request and suggest that this could be done based on the signature of the requestor. I suspect you cite the use of a signed request as an example since it is certainly not necessary. As a matter of fact, I might prefer to see an element that allows the requestor to specify some "name" or "identifier" as part of the request. So long as this field is returned as part of the authenticated response, the requestor can ensure that the correct identifier was used. Thus, authentication of the request is not required. (As a matter of fact, even if the request were signed, you'd still need to include the name of the signer in the authenticated response. If you didn't an attacker could just resubmit an altered request and sign on their own.) Such an identifier could arguably just be included in the URL, e.g. http://xkms.xmltrustcenter.org/us_gov_bridge_ca_confidential?name=Mike_Just <http://xkms.xmltrustcenter.org/us_gov_bridge_ca_confidential?name=Mike_Just > but it seems more reasonable to add a separate element (in case the name exceeds the length of URL accepted by some servers). Although I use a personal name in this example, this name might be the name of an application (as Jeremy highlights above or the name of a role). Mike
Received on Monday, 3 December 2001 08:34:06 UTC