- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Fri, 29 Jun 2001 15:40:07 -0400
- To: John Cowan <jcowan@reutershealth.com>
- Cc: imamu@jp.ibm.com, maruyama@jp.ibm.com, xml-encryption@w3.org
[Comment on: [1] http://www.w3.org/TR/2001/WD-xmlenc-decrypt-20010626 ] At 13:00 6/29/2001, John Cowan wrote: >While this transformation is probably a practical necessity, >I wish to express my concern about the use case given in >section 1.1. No one should be in the position of being asked >to sign a document of which parts are unreadable to him. I'd tweak that to say, "No one should be in the position of being asked to associate a signature semantic with data he did not see." Just as one should follow "Only What is 'Seen' Should be Signed" [2], and "'See' What is Signed" [3], one should do the same for any association of an explicit or implicit semantic (e.g., signature=authorize). It might be perfectly acceptable to sign data in encrypted form, and all the xmlsignature spec says is that a signature is over the encrypted data. The problem with the scenario is that there's an implicit signature semantic (authorize) associated with data that is not seen; this violates [2,3]. However, Bob could continue sign the encrypted data if you remove the implicit semantic and leave it to the bank (maybe based on a similar statement made by Bob) to figure out how much to pay and to whom. But this is just to continue my point, the scenario needs to be tweaked in a way such that it doesn't violate [2,3] but is simple/straightfward. [2] http://www.w3.org/TR/2001/CR-xmldsig-core-20010419/#sec-Seen [3] http://www.w3.org/TR/2001/CR-xmldsig-core-20010419/#sec-See Consequently, I propose: For example, Alice wishes to order and pay for a book from Bob using the mutually trusted payment system ZipPay. Bob creates an order form including the book title, price and his account info. He wants to sign all of this information, but will subsequently encrypt his account info for ZipPay only. He sends this to Alice who affirms the book title and price, signs the form and presents the twice-signed order with her own payment information to ZipPay. Two validate both signatures ZipPay will have to know that the cihper data version of the encrypted information is necessary for validating Alice's signature, but the plain data form is necessary for validating Bob's signature. -- Joseph Reagle Jr. http://www.w3.org/People/Reagle/ W3C Policy Analyst mailto:reagle@w3.org IETF/W3C XML-Signature Co-Chair http://www.w3.org/Signature W3C XML Encryption Chair http://www.w3.org/Encryption/2001/
Received on Friday, 29 June 2001 15:40:15 UTC