- From: Mike Just <Mike.Just@entrust.com>
- Date: Thu, 23 May 2002 15:22:25 -0400
- To: "'Alfred Arsenault'" <AArsenault@diversinet.com>
- Cc: "'stephen.farrell@baltimore.ie'" <stephen.farrell@baltimore.ie>, "'fjh@fjhirsch.com'" <fjh@fjhirsch.com>, www-xkms@w3.org
- Message-ID: <9A4F653B0A375841AC75A8D17712B9C90257AA8E@sottmxs04.entrust.com>
Hi Al, Much thanks for taking the time to look at our Requirements document [1] and provide your comments and suggestions. Responses to each of your comments are included below. We believe these issues have been sufficiently resolved. A current update of the Requirements document is available [2]. -----Original Message----- From: Alfred Arsenault [mailto:AArsenault@diversinet.com] Sent: Friday, April 05, 2002 1:37 PM To: 'stephen.farrell@baltimore.ie'; 'mike.just@entrust.com' Subject: RE: xkms requirements last call Mike & Stephen, <...snip...> Most of these are questions and/or editorial nits, but here goes: (Note: page numbers are what I got when I printed this out in standard mode. I realize that this is all hypertext stuff so section numbers are more important than page numbers, but I'm just trying to help you locate stuff quicker.) 1. p. 3, definition of 4-Corner Model: unless this is an "offically-approved definition" that can't be changed, I'd suggest changing "where end-entities interact" to "where each end-entity interacts". It makes it a little clearer who these 4 entities are (i.e., that there's (possibly) a different single trusted point of contact for each end-entity in a communication). [MJ] This was not an approved definition. We've made the change. 2. p. 4, last sentence before the start of section : Okay, so if I understand this correctly, these words will be applied to spec writers rather than software. That is, a "SHOULD" means that the spec writers really should put something in the spec about this, unless they come up with a really good reason not to. And, a "SHOULD NOT" means that the spec writers are advised to leave it out of the spec, unless they come up with a really good reason to put it in. That seems a little unusual, but I guess it's okay. I've made my comments in that vein. [MJ] This was confusing for others as well. We've added text to the end of the first paragraph of Section 1 to indicate the scope of the requirements: "This specification provides requirements for XML key management consistent with these goals, including requirements on the XML key management specification, server implementations and the protocol messages.". In most, if not all cases, of requirements on the XML Key Management specification, we've made these a MUST or MUST NOT. 3. pp.5 and 6, sections 2.1 and 2.2: It seems somewhat inconsistent to say that the design MUST be transport agnostic (item 5 in section 2.1) and also say that every trust service MUST support TLS (item 1 in Section 2.2). Also, I'm not sure why you're treating TLS differently from IPSEC (in item 1 in Section 2.2). There seems to be a mentality that "TLS is a Web service, and IPSEC is something else." From a technical security standpoint, I don't think I necessarily accept that. If I'm missing something, I apologize, but that just seems inconsistent to me. [MJ] 2.1.5 is meant to ensure that the design is agnostic. However, for reasons of interoperability we are mandating that some security services be implemented by servers. The wording of 2.2.1 has changed slightly, but the intent remains. We have to have some baseline support for interoperability and TLS and payload security seem to be an acceptable minimum. 4. p. 6, Section 2.2, item 3: The second "sentence" in this item isn't a sentence. What's missing? Should it say something like "In particular, the specification MUST define how the use of transport layer security such as SSL/TLS can be used to protect XML Key Management messages"? [MJ] Wording has been fixed. 5. p. 6, Section 2.2, item 9: This doesn't parse. If you change "key(s)" to "key's" it's at least a legal sentence, but I'm still not sure what the point is. [MJ] This requirement has been updated, including a change to reflect your concern above. 6. p. 7, Section 2.3, item 1: change "...services trust server" to "...services the trust server" [MJ] This requirement has been changed all together. 7. p. 7, Section 2.4, item 4 under [Capabilities]: Will this be a mandatory-to-implement feature? Many systems do not allow users to recover their own private encryption keys; e.g., if it's stored on a smartcard and the card breaks, the key could be permanently lost. You just get a new key and try to recover data the best you can. I think that, short of mandating functions for all possible clients, the best you can do is suggest ways that users can securely make backup copies of keys and recover encrypted data. I'd suggest changing this item to "The specification MUST address the issue of users losing access to private encryption keys. The specification SHOULD suggest options that could allow for the recovery of encrypted demo (e.g., ways to recover private encryption keys) for different types of clients." [MJ] Wording has been updated to enforce the point that this is a requirement on the specification and not on implementations. 8. p. 8, Section 2.4, item 5: This is really a requirement on the protocol, not on the specification. I don't object to it, but it doesn't seem to really belong here - somebody's just laying a foundation for his/her feature of choice. [MJ] The specification must ensure that this option is not precluded. One way to do this is for the specification to demonstrate how it can be done. 9. p. 8, Section 2.4, item 10: This seems to be saying that "there must be a version 2 of the XKMS Solution. It will be defined to include bindings to the XML protocol once that protocol is defined." I'd suggest saying that more clearly. [MJ] Sections 2.1.4 and 2.1.5 have been updated to reflect the relationship of XKMS to SOAP. 10. p. 9, section 2.5, item 4: In the last sentence, delete the word "which". [MJ] Done. 11. p. 10, section 2.5, item 9: I think you want "SHOULD not" changed to "SHOULD NOT", to be consistent with your term usage. Looking back at my comment 2, above, this is telling the spec writers "don't you dare define any new authentication mechanisms other than for PoP of keys, unless you believe that there's a really good reason to do that." Is that what you really want? [MJ] This have been moved to 3.19 (Out of Scope) and generalized to say that "[d]efining authentication mechanisms" is out of scope. It's just a means of limiting the scope of the workgroup. For what they're worth, there they are. Good luck. Use these as you see fit, and please let me know if you need more information or a better explanation on any of these. Al Arsenault Cheers, Mike [1] <http://www.w3.org/TR/xkms2-req> http://www.w3.org/TR/xkms2-req [2] http://www.w3.org/2001/XKMS/Drafts/xkms-req.html <http://www.w3.org/2001/XKMS/Drafts/xkms-req.html>
Received on Thursday, 23 May 2002 15:23:01 UTC