oasis-dss-1.0-profiles-ebxml-cd
OASIS Digital Signature Services eXtended (DSS-X) TC
Juan
Carlos Cruellas, UPC-DAC <cruellas@ac.upc.ede>
Stefan Drees, Individual Member,
<stefan@drees.name>.
Juan Carlos
Cruellas, , UPC-DAC, <pvde@sonnenglanz.net>
This specification is related to:
TBC
This document was last revised or approved by the OASIS DSS-X TC on the above date. The level of approval is also listed above. Check the “Latest Version” or “Latest Approved Version” location noted above for possible later revisions of this document.
Technical Committee members should send
comments on this specification to the Technical Committee’s email list. Others
should send comments to the Technical Committee by using the “Send A Comment”
button on the Technical Committee’s web page at http://www.oasis-open.org/committees/dss-x/.
For information on whether any patents have been disclosed that may be essential to implementing this specification, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the Technical Committee web page (http://www.oasis-open.org/committees/dss-x/ipr.php.
The non-normative errata page for this
specification is located at http://www.oasis-open.org/committees/dss-x/.
Copyright © OASIS ® 2007. All Rights Reserved.
All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification.
OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS may include such claims on its website, but disclaims any obligation to do so.
OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Committee Specification or OASIS Standard, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims.
The names "OASIS", are trademarks of OASIS, the owner and developer of this specification, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, specifications, while reserving the right to enforce its marks against misleading uses. Please see http://www.oasis-open.org/who/trademark.php for above guidance.
OASIS Digital Signature Services eXtended (DSS-X) TC
2.1.2 Relationship To Other Profiles
2.1.3 Element <dss:SignatureObject>
2.2 Profile of Signing
Protocol
2.2.1 Element <dss:SignRequest>
2.2.1.1 Element <dss:OptionalInputs>
2.2.1.1.1.1 Optional Input
<GenerateUnderSignaturePolicy>
2.2.1.1.1.2 Optional Input
<ReturnSupportedSignaturePolicies>
2.2.2 Element <dss:SignResponse>
2.2.2.2 Element <dss:OptionalOutputs>
2.2.2.2.1.1 Optional Output
<UsedSignaturePolicy>
2.2.2.2.1.2 Optional Output
<SupportedSignaturePolicies>
2.3 Profile of Verifying
Protocol
2.3.1 Element <dss:VerifyRequest>
2.3.1.1 Element <dss:OptionalInputs>
2.3.1.1.1.1 Optional Input <VerifyUnderSignaturePolicy>
2.3.2 Element <dss:VerifyResponse>
2.3.2.1 Element <dss:OptionalOutputs>
2.3.2.1.1 New Optional Outputs
ETSI has specified formats for Advanced Electronic Signatures (AdES) built on XML signatures as specified [XMLSig] -TS 101 903: “XML Advanced Electronic Signatures (XAdES)- and CMS signatures –TS 101 733: “CMS Advanced Electronic Signatures (CAdES)”-.
The DSS signing and verifying protocols are
defined in [DSSCore]. The “Advanced Electronic Signature Profiles of the OASIS
Digital Signature Service Version
AdES signatures may contain explicit identifiers of Signature Policy, which provides rules for generating and verifying these signatures.
This document extends [DSSCore] protocol specifying a number of operations for managing generation and verification of electronic signatures under the rules established by a Signature Policy, as identified in [SigPol-DSS-Req].
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in [RFC 2119].
All schema listings in the current document are excerpts from the schema file [SigPol-DSS-XSD]. In the case of a disagreement between the schema file and this document, the schema file takes precedence.
This schema is associated with the following XML namespace:
urn:oasis:names:tc:dss-x:1.0:profiles:SignaturePolicy:schema#
The table below lists the namespaces
referenced in this specification.
Prefix |
Namespace |
Specification(s) |
ds |
http://www.w3.org/2000/09/xmldsig# |
[XMLSig] |
dss |
urn:oasis:names:tc:dss:1.0:core:schema |
[DSSCore] |
xades |
http://uri.etsi.org/01903/v1.3.2# |
[XAdES] |
dssades |
urn:oasis:names:tc:dss:1.0:profiles:AdES:schema# |
[AdES-DSS] |
xs |
http://www.w3.org/2001/XMLSchema |
[XMLSchema] |
vr |
urn:oasis:names:tc:dss:1.0:profiles:verificationreport:schema# |
[DSSVerRep] |
Applications MAY use different namespace prefixes, and MAY use whatever namespace defaulting/scoping conventions they desire, as long as they are compliant with the Namespaces in XML specification [XML-ns].
[AdES-DSS] Juan Carlos Cruellas et al. Advanced Electronic Signature Profiles of the OASIS Digital Signature Service Version 1.0. http://docs.oasis-open.org/dss/v1.0/oasis-dss-profiles-AdES-spec-v1.0-os.pdf. OASIS Standard, February 2007.
[CAdES] CMS Advanced Electronic Signatures. ETSI TS 101 733, January 2007.
[Core-XSD] S. Drees et al. DSS Schema. OASIS, February 2007).
[DSS Core] Digital Signature Service Core Protocols, Elements and Bindings. Version 1.0. http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.pdf. OASIS Standard, 11 April 2007.
[DSSCore] S. Drees et al. Digital Signature Service Core Protocols and Elements. OASIS, February 2007.
[RFC2119] S. Bradner, Key words for use in RFCs to Indicate
Requirement Levels, http://www.ietf.org/rfc/rfc2119.txt,
IETF RFC 2119, March 1997.
[RFC 3001] M. Mealling. A URN Namespace of Object Identifiers.
IETF RFC 3001, November 2000.
[RFC 3852] R. Housley. Cryptographic Message Syntax (CMS) , IETF RFC 3852,
July 2004.
[SigPol-DSS-XSD] Juan Carlos Cruellas et al. Signature Policy Profile Schema,
OASIS,
[XAdES] Advanced Electronic Signatures. ETSI TS 101 733. March 2006.
[XMLSig] D. Eastlake et al. XML-Signature
Syntax and Processing. http://www.w3.org/TR/1999/REC-xml-names-19990114, W3C Recommendation, February 2002.
[XML-ns] T. Bray, D.
Hollander, A. Layman. Namespaces in
XML. http://www.w3.org/TR/1999/REC-xml-names-19990114, W3C Recommendation, January 1999.
[XMLSchema] Henry S. Thompson,
David Beech,
[DSSVerRep] Ingo Henkel, Detlef Hühnlein. Profile for comprehensive
multi-signature verification reports for OASIS Digital Signature Services
Version 1.0
[SigPol-DSS-Req] Juan
Carlos Cruellas. Requirements
for specifying the Signature Policy Profile of the OASIS Digital Signature
Services, OASIS, November 2007
This profile supports a number of operations for managing generation and verification of electronic signatures under the rules established by a Signature Policy, as identified in [SigPol-DSS-Req].
For the generation of electronic signatures, the following operations apply:
SignRequest. This operation supports:
Requesting generation of a signature under a certain signature policy, allowing clients to explicitly identify that signature policy in the request. This identification may be through the usage of both, a URI or an OID.
Passing to the server the location and/or the digest of the electronic document where the signature policy is specified .
Requesting to the server the incorporation within the signature to be generated the identifier of the signature policy under which it has been created, using syntaxes defined in [XAdES] or [CAdES].
Requesting also a list of the supported signature policies supported by the server.
SignResponse. This operation supports delivery of:
Electronic signatures with the identifier of the signature policy under which they have been generated.
Indication of the signature policy under which the signature has been generated within <dss:SignResponse> .
Digest of the electronic document where the signature policy is defined, as a double check facility for the client.
A code error in case the server may not sign with the requested signature policy.
The list of supported signature policy identifiers.
For electronic signature verification (and updating) the following operations apply:
VerifyRequest. This operation supports requests for:
Request the verification of a signature under a certain signature policy, if the signature does not contain an identifier of such policy, by using an identifier of that policy.
Requesting signature verification under the signature policies identified within the signature, if any identifier is present there.
Passing to the server the location and/or the digest of the electronic document where the signature policy is specified.
Requesting return of explicit indication of the signature policies under which the electronic signatures have been verified.
Requesting also a list of the supported signature policies supported by the server.
VerifyResponse. This operation supports delivery of:
Indication of the signature policies under which the server has verified the electronic signatures mentioned above.
Digest of the electronic document where the signature policy is defined, as a double check facility for the client.
A code error in case the server may not verify the electronic signature(s) with the requested signature policy(ies).
The list of supported signature policy identifiers.
This document profiles the DSS signing and verifying protocols defined in [DSSCore].
The profile in this document is based on the [DSSCore]. The profile in this document may be implemented.
This profile provides means for the explicit management of signature policies with [DSSCore] and other existing profiles like [AdES-DSS], and as such, it may be used in conjunction with these specifications.
This profile supports requests for generation and verification of electronic signatures under a given signature policy.
Although this specification does not impose any constraint the format of the signatures generated by the servers or sent to the servers for verification, it nicely fits with formats of advanced signatures as defined in [XAdES] and [CAdES].
This clause profiles the <dss:SignRequest> element.
This profile does not impose any restrictions on any optional input specified in the [DSSCore] or other profiles.
This profile defines a new Optional Input as indicated below.
This optional input will specify the signature policy under which the server is requested to generate the electronic signature.
Below follows the schema for this element:
<xs:element name="GenerateUnderSignaturePolicy" type="SignaturePolicyDetailsType"/>
<xs:complexType name="SignaturePolicyDetailsType">
<xs:sequence>
<xs:element name="SignaturePolicyIdentifier" type="xs:anyURI"/>
<xs:element name="SignaturePolicyLocation" type="xs:anyURI"
minOccurs="0"/>
<xs:element name="DigestAndAlgorithm"
type="xades:DigestAlgAndValueType" minOccurs="0"/>
</xs:sequence>
</xs:complexType>
Element <SignaturePolicyIdentifier> contains the identifier of the signature policy as an URI. Signature policies MAY be identified by an URI or by OIDs. Should the signature policy identifier requested by the client be an OID, this element will contain a URN built from the actual value of this OID as specified in [RFC 3001].
Element <SignaturePolicyLocation> is optional and contains the location where the electronic document specifying the identified signature policy may be found.
Element <DigestAndAlgorithm> is optional and contains the digest value of the aforementioned electronic document and the identifier of the digest algorithm used for computing such a value.
This optional input is an empty element, which, when present instructs the server to return within the corresponding <dss:SignResponse> the <SupportedSignaturePolicies> Optional Output identifying all the signature policies supported by this server as described later on in this document.
Below follows the schema for this element:
<xs:element name="ReturnSupportedSignaturePolicies" />
This clause profiles the <dss:SignResponse> element.
This profile adds the following <ResultMinor> values to the ones already specified in the [DSSCore] for those cases where the <ResultMajor> code is Success.
urn:oasis:names:tc:dss-x:1.0:resultminor:error:SignaturePolicyNotSupported
The server does not support the signature policy identified in the request.
urn:oasis:names:tc:dss-x:1.0:resultminor:error:SignaturePolicyDigestFailure
The server computed a digest value on the electronic document defining the signature policy that was not equal to the value included in the request,.
urn:oasis:names:tc:dss-x:1.0:resultminor:error:SignaturePolicyIdentifierError
The server concluded that the identifier of the signature policy was not correctly built.
This profile does not impose any restrictions on any optional output specified in the [DSSCore] or other profiles other than those explicitly mentioned in the clauses below.
This profile defines new Optional Outputs as indicated below.
This optional output will provide to the client details of the signature policy under which the server has actually generated the electronic signature.
Below follows the schema for this element:
<xs:element name="UsedSignaturePolicy" type="SignaturePolicyDetailsType"/>
No additional constraints are specified for the
contents of this element.
This optional output will provide to the client details of the signature policies under which the server is able to generate electronic signatures.
Below follows the schema for this element:
<xs:element name="SupportedSignaturePolicies">
<xs:complexType>
<xs:sequence>
<xs:element name="SupportedSignaturePolicy"
type="SignaturePolicyDetailsType" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
</xs:element>
No additional constraints are specified for
the contents of <SuppoertedSignaturePolicy> elements.
This clause profiles the <dss:VerifyRequest> element.
This profile does not impose any restrictions on any optional input specified in the [DSSCore] or other profiles.
This profile defines a new Optional Input as indicated below.
This optional input allows to instruct the server to use certain signature policy for verifying all (or selected) signatures that do not contain an explicit indication of having been produced under a certain signature policy.
Signatures containing such an explicit indication MUST be verified using the explicitly indicated signature policy, regardless the contents of the optional input specified in this section.
<xs:element name="VerifyUnderSignaturePolicy" type="VerifyUnderSignaturePolicyType"/>
<xs:complexType name="VerifyUnderSignaturePolicyType">
<xs:sequence>
<xs:element name="DefaultPolicy" type="SignaturePolicyDetailsType" minOccurs="0"/>
<xs:element ref="ExplicitPolicies" minOccurs="0"/>
</xs:sequence>
</xs:complexType>
<xs:element name="ExplicitPolicies" type="PolicySignaturePairsType" />
<xs:complexType name="PolicySignaturePairsType">
<xs:sequence>
<xs:element ref="PolicySignaturePair" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:element name="PolicySignaturePair" type="PolicySignaturePairType" />
<xs:complexType name="PolicySignaturePairType">
<xs:sequence>
<xs:element ref="SignatureIdentifier" />
<xs:element ref="SignaturePolicy" />
</xs:sequence>
</xs:complexType>
<xs:element name="SignaturePolicy" type="SignaturePolicyDetailsType" />
<xs:element name="SignatureIdentifier" type="vr:SignatureIdentifierType" />
Optional element <DefaultPolicy> specifies a default policy that the server should use for verifying any found signature that: does not have any explicit indication of signature policy and that it is not referenced within the <ExplicitPolicies> element.
Optional element <ExplicitPolicies> is a list of [signature , signature policy] pairs, each one instructing the server to verify the referenced signature of the pair with the signature policy indicated in the pair. Should the referenced signature contain an explicit indication of a different signature policy, the server will use this last one and will issue a warning reporting this situation.
This profile does not impose any restrictions on any optional output specified in the [DSSCore] or other profiles other than those explicitly mentioned in the clauses below.
This profile defines new Optional Outputs as indicated below.
This optional output will be returned by the server to indicate under what signature policy a certain signature has been verified.
<xs:element name="VerifiedUnderSignaturePolicy" type="VerifiedUnderSignaturePolicyType"/>
<xs:complexType name="VerifiedUnderSignaturePolicyType">
<xs:sequence>
<xs:element ref="SignaturePolicy" />
<xs:element ref="SignatureIdentifier" minOccurs="0"/>
</xs:sequence>
</xs:complexType>
Mandatory <SignaturePolicy> will identify the signature policy used.
Optional <SignatureIdentifier> references the signature that was verified under such a signature policy.
Should
this optional output be present within the <vr:IndividualSignatureReport> then <VerifiedUnderSignaturePolicy> will not contain the <SignatureIdentifier> optional element (as this element will actually appear as child of <vr:IndividualSignatureReport>).
Should
this optional output not be present within the <vr:IndividualSignatureReport> and <SignatureIdentifier>
not present, this optional output will report that all
the signatures found have been verified with the same signature policy
indicated in <SignaturePolicy> element.
The present profile defines two conformance levels. These two levels are defined in the clauses below.
Any implementation of this profile is conformant with this specification if:
1. It fully supports the signing protocol, satisfying the the MUST or REQUIRED level requirements defined in this specification for the aforementioned protocol.
2. It only supports <VerifyUnderSignaturePolicy>’s <DefaultPolicy> child in the <dss:VerificationRequest> element.
3. It only supports <VerifiedUnderSignaturePolicy>’s <SignaturePolicy> child in the <dss:VerificationResponse> element.
4. It satisfies the MUST or REQUIRED level requirements defined in this specification except those that affect the not supported elements of the verification protocol (namely <VerifyUnderSignaturePolicy>’s <SignatureIdentifier> child and <VerifiedUnderSignaturePolicy>’s <SignatureIdentifier> child ).
Any implementation of this profile is conformant with this specification if:
1. It fully supports the signing protocol, satisfying the the MUST or REQUIRED level requirements defined in this specification.
2. It fully supports the verification protocol, satisfies the MUST or REQUIRED level requirements defined in this specification for the aforementioned protocol.
Revision |
Date |
Editor |
Changes
Made |
0.1 |
2008-04-25 |
Juan Carlos
Cruellas |
Initial Draft. No profile for verification protocol. |
0.2 |
2008-06-09 |
Juan Carlos
Cruellas |
Addition of verification protocol and two conformance levels. |
|
|
|
|