- From: Hallam-Baker, Phillip <pbaker@verisign.com>
- Date: Tue, 17 Dec 2002 09:27:58 -0800
- To: "Www-Xkms (E-mail)" <www-xkms@w3.org>
- Message-ID: <CE541259607DE94CA2A23816FB49F4A310FEFB@vhqpostal6.verisign.com>
All,still editing the spec, but the changes for some of the other issues are likely to be lengthy so will continue in another message Changed date to Dec 16th Issue 98: Closed We decided to remove the policy identifier in favor of UseKeyWith and so this issue is now redundant Issue 30: Close Policy Identifier removed OK next changes are complex since so much touches on UseKeyBinding. These changes address issues 30, 84, 79 and in part 117 Element <UseKeyWith> The <UseKeyWith> element specifies a subject identifier and application identifier that determine a use of the key. In the case of a <KeyBinding> or <UnverifiedKeyBinding> the <UseKeyWith> element specifies a use of the key. If multiple <UseKeyWith> elements are present each element specifies a use of the key. In the case of a <QueryKeyBinding> or <TemplateKeyBinding> the <UseKeyWith> element specifies an intended use of the key. If multiple <UseKeyWith> elements are present each element specifies an intended use of the key. Application [Required] A URI that specifies the application protocol with which the key may be used Identifier [Required] Specifies the subject to which the key corresponds within the specified application protocol. <UseKeyWith> application identifiers MAY be used to represent key binding issuance and/or use policies instead of an application protocol. In this case the <UseKeyWith> element specifies that the key binding complies with the specified policy. In the case that a client follows a referral model in which raw key binding information is obtained from a Locate service then forwarded to a validate service the <UseKeyWith> elements in the query should in both cases specify the uses for which the application intends to use the key. Applications SHOULD NOT forward <UseKeyWith> elements returned in a Locate result in a subsequent Validate query. The following table lists application URIs for common protocols and the corresponding format for the identifier information: Protocol Application URI Identifier Type XKMS http://www.w3.org/2002/03/xkms# URL identifying SOAP role URL XKMS/profile http://www.w3.org/2002/03/xkms#profile URL identifying SOAP role URL S/MIME urn:ietf:rfc:2633 SMTP email address of subject RFC822 addr-spec PGP urn:ietf:rfc:2440 SMTP email address of subject RFC822 addr-spec SSL/HTTPS urn:ietf:rfc:2817 DNS address of http server DNS Address SSL/SMTP urn:ietf:rfc:2487 DNS address of mail server DNS Address IPSEC urn:ietf:rfc:2401 IP address of network resource IP Address PKIX urn:ietf:rfc:2459 Certificate Subject Name X.509 Distinguished Name The XKMS application URI is used to specify a key binding that is used to secure an XKMS service. An XKMS service SHOULD support discovery of the supported security profiles and corresponding key bindings by means of a Locate operation that specifies the XKMS application URI and the URL of the service role. The following table describes the formatting for the specified types of identifier: Identifier Type Example Description RFC822 addr-spec bob@cryptographer.test The addr-spec fragment of an RFC 822 email address as used by SMTP URL https://secret.commerce.test/ A Uniform Resource Locator DNS Address secret.commerce.test An Internet DNS address IP Address 10.23.0.20 An IPv4 address in decimal notation 1080::8:800:200C:417A An IPv6 address in <outbind://1/#RFC-2373> RFC 2373 notation X.509 Distinguished Name C="UK" O="CryptoGuys Ltd." CN="Bob" An X.509 Distinguished Name The following schema defines the <UseKeyWith> element: Issue 96 Removed the sentence Joseph comments on as obsolete. Issue 108 Done Issue 119 Done Issue 121 Done Issue 123 Done as per Ed's message Issue 124 Done 58 is done except for the organizations for the following: Eric Brunner-Williams Jean Pawluk, Pradeep Lamsal Outstanding (major) 122, 120, 118, 117, 116, 115, 114, 103, 74, 71, 57, 25, 47 Outstanding (last minute) 17, 18, [final audit] 37, 39, 55 [is a duplicate of 25] 58 63 99 102 [ none at present but they do seem to keep popping back] I think are closed - 36 - we use SOAP throughout except where we mention the XML Protocol working group
Received on Tuesday, 17 December 2002 12:28:04 UTC