OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

dss message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Draft minutes


Colleagues - Please find below, draft minutes of the first DSS face-to-face.
Please post corrections to the list for discussion during the next telecon.
Thanks a lot.  All the best.  Tim.



Minutes
OASIS Digital Signature Services
Face-to-face number 1, 24-25 July 2003
Location: Burlington, MA

Actions: 

The following actions were established during the course of the meeting.

1. Update requirements document by August 1st (Trevor).

2. Produce initial schema for the sign/verify and timestamp operations by
5th Aug. (Trevor will work with Juan-Carlos).

3. Post a discussion on compound operations to the list (Ed).

4. Produce analysis of the submitted materials on timestamp token syntax.
If possible, provide draft text to Trevor by 1st Aug (Tim).

5. Send references to timestamp token syntax to Tim.  (Juan-Carlos) -
complete

6. Send Overview text to Trevor by 1st Aug.  Mention bindings issues
(Frederick).

7. Produce initial text on the WS-Security profile (Frederick).

8. Update intellectual property page (Nick/Juan-Carlos).  Currently, the DSS
page has two declarations on IPR.  

10. Check with John Messing regarding an author for the notary service
profile (Nick).

11. Check whether there is a need for a profile for the German signature law
(Andreas).

Issues

The following issues were identified

1. If the server does not support one or more of the property values
requested by the client, should it complete the signature?  The topic was
discussed at the meeting, and it was decided that unless the server can do
exactly what it is asked, it will return an error.

2. What mechanisms for identifying target nodes should we support?  E.g. id
attributes, XPath expressions, etc..

Minutes of the meeting

1. Quorum was achieved.

2. The agenda was reviewed.

The following items were added to the agenda.
1.	Discussion of signature formats (such things as PKCS#7, PGP,
EDIFACT, in addition to XML digital signature).
2.	Discussion of bindings and WSDL.
3.	Discussion of patents.
The modified agenda was agreed.

3. Content of the core document and profiles

A structure for the core document was decided.  It will contain two main
sections.  One will describe the protocol and its extensibility points.  The
other will define the token structure, including generally useful attributes
with global definitions and extensibility points.

Profile documents will specify the functions performed by the service.

4. Token syntax

The question of the syntax of the timestamp token was discussed.  It was
suggested that the <Manifest> element is probably the right place to put the
document digest, as opposed to the <References> element, because the
verifier won't be able to verify the hash when the pre-image is not
available.

It was agreed that a DSS-created signature must be verifiable by a standard
DSS implementation and vice-versa.

It was agreed that the group will have to define the syntax of a timestamp
token (TST) element, similar to the RFC 3161 token syntax definition.  The
time element definition in the TST should be re-useable as a time-mark
element.  

If the document is both signed and time-stamped, then there probably will be
two separate digests and signatures (one for each).  On the other hand, if
it is a time-marked document, there may be only one digest and signature.

Hal pointed out that the semantics of messages in each form must be clear:
no multiple semantics for the same syntax.

XAdES defines a location for time in its signature syntax definition.  XML
Dsig does not.  

5. Protocol syntax

The question of support for legacy signature formats was raised.  It was
suggested that this should have no impact on the protocol.  On the other
hand, Hal suggested that some requests may have to be tailored to the
requirements of the requested signature format.

The motivation behind verifying at a server was discussed.  Following
discussion, it was confirmed that there is value to this.

The question of how to express a request for a compound operation (e.g.
signature AND timestamp) was raised.  Simplicity for the client must be
paramount.

The question of whether the service should be stateful or stateless was
raised.  We decided to proceed on the basis of a stateless model.

5.1  Update operation

One compound operation is "update".  This "refreshes" a timestamp or
signature by verifying the original and applying a new timestamp or
signature, possibly adding new information.

There was discussion of the best way to implement composability and
extensibility.  It was decided to consider concrete schema proposals to help
us compare the available approaches.  However, there appears to be a need to
define four operations: sign, timestamp, verify and compound.

It was suggested that "update" could be a variant of the verify operation.
Any information added by the update operation can be returned in a verify
response.  

Frederick suggests that update should be a separate operation, not a variant
of one of the other operations.  

It was also suggested that update is a more natural variant of the sign
operation.

5.2 Requestor identity

The service requestor is identified in the operation response and derived by
the server, based on available authentication information.  The server may
have fewer keys than there are requestors.  Therefore, it is important to
have a way to identify the requestor in the response.  Nick pointed out that
the requestor name in Section 3.3.2 of the use-cases and requirements
document may be a role; it is not necessarily a unique name.

The discussion turned to the applicability of the Liberty Alliance
authentication context in relation to the requestor identity.  This would be
an optional attribute of the signature.

The requestor should be able to stipulate which requestor identity to use.
The requestor identity could additionally be used to select the signing key.
However, it was felt that it is better to keep these two data items
separate.

5.3 Policy

There was discussion of policies and how they would be associated with
services and operations.  The policy discussed here is what ETSI would call
a signature policy.

Policies can be implicit in the identity of the end-point to which the
request is sent.  Static aspects of policy can be expressed in application
profiles.  Then there are options within a profile.  For the time-being, we
will just allow policy to be represented by an identifier; we won't specify
any elements of policy.  If the policy is implied by the service URI, then
the policy indicator does not have to be used.  However, it is important to
put the policy indicator in the response.  All of the policy features are
optional.

Policies may be published out of band (e.g. posted at an HTTP URL).

In the case of the verify operation, if the request does not contain a
signature policy indicator, then the server may indicate which signature
policy it used.  According to the ETSI signature policy model, signatures
must be created and verified under the same policy.

There was some discussion of "reports".  I.e. reporting on the status of
each step in the processing of a request.  There was no definite conclusion.

The question of WYSIWYS was discussed.  It was concluded that this only
applies to human interactions.

5.4 Metadata

Service capabilities should be published in a metadata service; this will
not be an operation specified by DSS.

It was asked whether we need to provide the document schema in order for the
signer to find the nodes that it has to sign.  What happens in the case
where there are no id attributes in the document?

The verify operation will simply check if the document signature is valid,
without stipulating which nodes should have been protected.  It is a design
aim that you shouldn't have to have the document schema in order to sign,
either using id attributes or XPath expressions.  

In some cases, the service may not be able to return the signature
immediately.  However, notification is complicated to implement.  So, it was
decided to provide an indication mechanism, but not to define the protocol
in the current version.  

6. Schema

The EPM submission has some of the characteristics required for the DSS
protocol.  However, it is focused on PKCS#7 signatures.  It doesn't have
some of the features that have been identified for DSS.

The group considered one operation: the sign request and started to flesh
out the syntax.  

It was decided to import ETSI syntax definitions where appropriate.

Operations have a range of options associated with them.  The protocol
allows for "properties" to be requested.  The question arose as to whether
all options can be modeled as properties.  Options include such things as:
the intended audience, placement of the resulting signature
(detached/enveloped/enveloping), supporting information (that is returned,
but is not part of the signature), additional processing options, signature
policy indicator, etc..  A signed property could be used to request the
inclusion of a timestamp in the response.  It was decided to proceed on the
assumption that the properties model is adequate for expressing all the
operation options.

User data may include such things as: transforms and selection of the data
target, 

6.1 Signature response

There was discussion of whether we should have a WS-Security profile for
signing/verifying a WS-Security header.  This will be added to the list of
profiles to be addressed.

There was some discussion about the need to pass the document to the service
and to return it, in the case that an enveloped signature is requested.  The
issue is one of latency due to serialization of the document in both
directions.  If the document is not returned, the client would not have to
apply the canonicalization chosen by the service.  It was decided that the
client should be required to use the detached signature option if they want
to avoid having the document returned to them.

The question of correlating requests and responses was raised.  It was
decided to include an optional request id.

7. DSS profiles

Application profiles should define some processing rules, in addition to
signature format, bindings, additional type definitions, etc..  Ones
identified so far include: XAdES (Juan-Carlos), CMS (Trevor), EPM (Steve),
WS-Security (Frederick, Hal, Tim), code-signing JARs (Trevor), S/MIME
(Trevor), notary service.

Extension points must be incorporated into the schema.

8. Planning

Trevor was appointed editor for the core document.

The group worked on the outline of the core document.  There was discussion
on how to represent schema (i.e. which convention to follow).

9. Patents

Several patent applications have been brought to the attention of the group
by Secstan, Zolera and John Messing.

On the topic of the Zolera patent, Rich Salz will provide a contact.

10. Work plan

5th August 2003, first draft of the core specification posted to the list.
21st December 2003, Committee Spec. of the core specification and at least
one binding (SOAP).
June 2004, OASIS standard
31st March 2004, XAdES profile
31st March 2004, EPM profile
31st March 2004, Web-services profile

11. Miscellaneous

The group agreed that at some point in the future, it will notify the S/MIME
group about this activity.

Steve mentioned that UPU has retained a consultant to investigate whether
the EPM specification conforms with the EU directive on electronic
signature.  The results may be made available to this group.

The meeting adjourned 2:20pm on 25th July.

-----------------------------------------------------------------
Tim Moses
613.270.3183


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]