kmip message
[Date Prev]
| [Thread Prev]
| [Thread Next]
| [Date Next]
--
[Date Index]
| [Thread Index]
| [List Home]
Subject: KMIP spec clarifications for Pub/Priv Key and Certificate
- From: Bruce Rich <brich@us.ibm.com>
- To: kmip@lists.oasis-open.org
- Date: Wed, 10 Mar 2010 22:37:53 -0600
There are some portions of the KMIP
spec that deal with Certificates and Public and Private keys that are still
a little mysterious to me. It could be that these are addressed somewhere
than the spec, and someone can point me to the relevant text. Failing
that, we either need to clarify now, or potentially in the 1.1 spec/profile
where Asymmetric comes into play
For PublicKey and PrivateKey objects:
1)
How do we represent the CryptographicLengths of these objects? The
actual lengths of the cryptographic material may vary, depending on input
parameters, but users thinking they have a 1024-bit key pair will be quite
dismayed if our length calculator reports anything other than what was
input to the generation process. This becomes more problematic for
keys that arrive via Register, rather than CreateKeyPair.
Would propose that the lengths should be what
the keypair generator would require as input, rather than a mechanical
evaluation of the key itself. This may require some "fuzzy logic"...it's
1024-bitish...the spec should clearly instruct the server implementers
what to do and what the limits might be on their flexibility.
For Certificate objects:
1)
Do all Certificates have a CryptographicAlgorithm? If so, what is
it? None of the current algorithms seem to relate to the actual signature
on the certificate.
Would propose that the algorithm of the Certificate
is the algorithm of the enclosed public key.
2)
Do all Certificates have a CryptographicLength? If so, what is it?
I do not believe that the bitlength of the encoded certificate is
very interesting...
Would propose that the length of the Certificate
is the length of the enclosed public key (as interpreted above).
3)
The CertificateSubject is a structure with the distinguished name of the
subject, along with alternate names. Both of these are simply listed
as text strings, but no mechanism is suggested for producing these strings
from the underlying ASN.1 in the certificate. We may luck out on
producing the former, but the latter is the road less travelled, and may
produce more mismatches. (Not to mention that one may loses some
context in knowing what kind of alternate name this was, if I remember
correctly. Simply rendering as a text string may lose the fact that
this alternate name was the DNS Name, for example).
Would propose that a TC member might take
this one as a work item, if we are addressing only in 1.1. (And I
suspect a production rule is really needed even for the dn.)
4)
Similar comments regarding CertificateIssuer.
Bruce A Rich
brich at-sign us dot ibm dot com
[Date Prev]
| [Thread Prev]
| [Thread Next]
| [Date Next]
--
[Date Index]
| [Thread Index]
| [List Home]