- From: <Mary_Ellen_Zurko@iris.com>
- Date: Tue, 4 Sep 2001 08:28:44 -0400
- To: reagle@w3.org
- Cc: www-xkms-ws@w3.org
- Message-ID: <OFEF710B3F.7251917E-ON85256ABD.004432A1@iris.com>
Hi Joseph (et al),
Replay, not reply :-). The question is, can any harm be done by re-sending
a message multiple times (a message that was sent from someone else in the
first place). Text book examples of this are things like a message from me
saying "Deposit $1000 into Joseph Reagle's account" to my bank. Real life
examples tend to be more subtle. I did notice there was no discussion of
just what damage replay could do in this context, and it wasn't clear to
me on a quick read what it would be. If people have been using this
protocol for a while, maybe they have thought about it. Otherwise, I
imagine the WG will think about it a bit. Either way, the results should
be written down.
Mez
Joseph Reagle <reagle@w3.org>
08/31/01 02:46 PM
Please respond to reagle
To: Mary_Ellen_Zurko@iris.com
cc: www-xkms-ws@w3.org
Subject: Re: Proposed Final Charter and Activity Proposal
On Wednesday 29 August 2001 15:58, Mary_Ellen_Zurko@iris.com wrote:
> "XKMS implementations must be able to interoperate in a useful and
secure
> fashion for all tiers of services".
I've added "These features, and their specification, must be able to
interoperate in a secure fashion. to requirement 3.
> As a specific example, I'm concerned that there seems to be
> no way to guard against replay detection when interoperating between
> different implementations.
A reply in what sense? My understanding is that XKMS defines the grammar
and
syntax for exchanging keys and their metadata. I assume the integrity and
authenticity of that information (like a key query) would be covered by
XMLDSIG and SAML?
Received on Tuesday, 4 September 2001 08:30:48 UTC