- From: Joseph Reagle <reagle@w3.org>
- Date: Wed, 16 Jan 2002 12:15:02 -0500
- To: www-xkms@w3.org
http://www.w3.org/2001/XKMS/Drafts/xkms-req-20020108.html Key Validation A service that verifies the binding of elements to a public key and also determines the validity status of the public key. For example, key validation may be performed based on elements secured to a public key in an X.509 certificate as in RFC 2459. r: When we mean validation, do we always mean validation? Do we ever mean verification? http://www.ietf.org/rfc/rfc2828.txt Trust Service A service that is capable of registering public keys and/or providing key information services, including key validation and location. r: Any chance of calling this a "key" service. Particularly as multiple tiers might be referred to as a "trust service" right, for the lower ones, that might seem more inapproriate. 2 -- Design Principles and Scope 1. Universality and Usability 1. Request and response messages should be extensible. 2. All messages and data structures must be specified in XML, using XML Schema [45]XMLSchema]. r: I presume like xmldsig and xenc we do not require validation? 3. Element cardinality not equal to one, must be justified in the specification. Similarly, the use of optional elements should be justified. r: I'm happy to constrain optionality, but the "cardinality not equal to one" is a little awkward. (What justifications will be necessary in the spec). Perhaps if we said the use of optional features is discouraged (instead of focussing on elements). 4. The specification must provide a binding to SOAP 1.1 [46]SOAP ] and migrate to XML Protocol [47]XMLProtocol] once defined List([48]Blair Dillaway)]. Interoperable SOAP support is required, e.g. Document literal encoding for compatibility with KeyInfo. r: We will profile SOAP? Does this require an XKMS to conform to all of the SOAP spec? (I'm not saying it shouldn't just wondering.) 7. Privacy considerations must be addressed. r: To make this more substantive, should we say in the "Security Concerns" section? 12. Support for legacy formats such as PKCS#10 and PKCS#7 should be defined. r: I'm not sure what this entails? XML structures that emulate these formats? That the key service be able to work with them? 3. Protocol Design 5. The specification must describe how to register more than one public key in a single registration request. 7. The specification must describe how to support template bulk registration with server generation. {Verisign} [54]WorkshopMinutes] r: Are 5 and 7 distinct? 8. The specification must define a request for retrieving a public key, given a <Ds:KeyInfo> element containing one or more key r: Is that <ds:KeyInfo>? (instead of Ds?) 3 -- Requirements 2. Payload and Protocol Definition 11. The specification must allow the server to return a subset or superset of the elements requested by the clients. {Reagle} [63]WorkshopMeeting] r: Well, I'd like to be clear on this. This might be possible, but I'm very concerned about the security implications of returning less (or more) information as well. I'd like a requirement that we consider the security concerns related to the respond of the query with respect to this. [1] [1] http://lists.w3.org/Archives/Public/www-xkms-ws/2001Dec/att-0029/01-09-proposal.html [05-06] Will this return keys with KeyName and KeyValue, or KeyName or KeyValue? I presume the query is conjunctive: all MUST match for a return. What about the Respond? If the only some of the requested data can be returned for the matched key, I assume they will be returned. I presume the respond is disjunctive: all data that can be returned will be. I believe that thinking of this as a simple protocol and a simple query/lookup will be important to the design and its security, we should probably look at the literature on securely designing database queries. 4. Processing 7. The specification should allow use of user-generated pass phrases as a means of proving ownership of a key(s) previously registered. 8. The specification should provide a means of employing a secret, arranged out-of-band, between the registration service and end-user as a means of authorizing a registration action. List([69]Blair Dillaway)] r: I'm not sure if these bullets belong in the "processing" section, or maybe we should distinguish between xml and security processing? 4 -- Coordination To ensure the above requirements are adequately addressed, the XML Key Management specification must be reviewed by a designated member of the following communities: 1. XML Signature WG 2. XML Encryption WG 3. [74]XML Protocol 4. XML Schema WG 5. XML Core WG 6. Internationalization IG r: I don't think it is necessary to procure review from schema or core for XKMS. 5 -- Intellectual Property The specification should be free of encumbering technologies: requiring no licensing fees for implementation and use. r: I suggest excerpting and reference the text in the charter to avoid nuanced legal conflicts between terms: r: As required by the [Charter], "Any intellectual property essential to implement specifications produced by this Activity must be at least available for licensing on a royalty free license." -- Joseph Reagle Jr. http://www.w3.org/People/Reagle/ W3C Policy Analyst mailto:reagle@w3.org IETF/W3C XML-Signature Co-Chair http://www.w3.org/Signature/ W3C XML Encryption Chair http://www.w3.org/Encryption/2001/
Received on Wednesday, 16 January 2002 12:15:07 UTC