OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

dss message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [dss] ANSI X9.95 and timestamping profile


Dimitri,

First of all a perhaps silly question...sorry if
it actually is...
Is there any rationale behind that advices to
just renew the time-stamp instead re-timestamping
the document or even generate a new time-stamp for
both depending on the context or is it
just a way of offering different alternatives to the
market and let it decide?.

Just as an example, in XAdES for instance,
when we have to renew timestamps for signatures
long term archiving, we generate
a new timestamp that includes both certain
elements of the signature itself and previously generated
timestamps....

Concerning the details on how to deal with the
technicalities in XML....
I have understood (but perhaps not correctly)
you propose two alternatives:
1. To add the old token as the second child. So that you
are sugesting to have a <ds:Signature> as the child of
the <ds:Signature>/<ds:Object> just generated....
So this would imply that each renewal of the time-stamp
would imply increase the level of depth at which you would
have ds:Signature corresponding to former time-stamps...
Have I correctly understood it?.

2. To add the old token within the <dss:TSTInfo> so in the
end, the most recently token would be a <ds:Signature> with
a <dss:TSTInfo> that in its turn would have a <ds:Signature>
with another <dss:TSTInfo> with another <ds:Signature> and so on

Well, certainly the alternative 1 somehow makes visible at the
level of the signature itself the details of the linking in time
between the token and those previously generated. The second
one just encloses these details within the <dss:TSTInfo>, and
the management of all the information of previous tokens would
be conceptually linked to the processing of <dss:TSTInfo>. I would
say that if we go on with this work, I would be more in favour of
this last one.

Regards

Juan Carlos.

Dimitri Andivahis wrote:

>Trevor, Nick,
>
>This method can be used to assert integrity and time of existence 
>of a document in long term archives, while at the same time 
>it maintains a clear distinction between the document itself 
>(possibly containing electronic signatures) and the collected 
>timestamping information about it.  Renewing a timestamp token 
>for a given document results in a newly generated timestamp 
>token that takes the place of the previous timestamp token.
>
>This method has been included in ANSI X9.95, ISO/IEC 18014-2, 
>and ISO/IEC 18014-3.  I expect it will be practiced by vendors who 
>follow these standards.  It is general enough in scope that 
>it could be applied to any type of timestamp token, and it can 
>be used to support renewal of legacy tokens using XML timestamp tokens.  
>If the types and processing rules for supporting the renewal method 
>in XML timestamp tokens are defined with some care, it can allow 
>for a mix of any XML timestamp token types in the "Russian doll structure".
>
>There are different possible ways to implement this method within 
>the DSS timestamping profile.  One possibility that agrees well
>with the protocols in ANSI X9.95 is to specify the previous token 
>in a sign request via a new optional input such as RenewTimestamp:
>
><xs:element name="RenewTimestamp">
>  <xs:complexType>
>    <xs:sequence>
>      <xs:element ref="dss:Timestamp">
>    <xs:sequence>
>  </xs:complexType>
></xs:element>
>
>that carries the previous timestamp token.
>
>The service generating the renewal token need make no assertions
>about the validity of the previous token submitted to it.  The client 
>must verify that the previous token matches the document(s) of interest, 
>and the client should verify that the previous token is presently 
>valid at the time of renewal.
>
>For XML processing rules for <ds:signature>, if this optional input 
>is present, the service must include the previous token as 
>the second child element of <ds:Signature>/<ds:Object> in the 
>generated renewal token and cover it with the signature.  Currently, 
><TstInfo> is the only specified child element of <ds:Signature>/<ds:Object>.
>[Alternatively, we could update the definition of the <TstInfo> type
>and add the previous token as a child element of <TstInfo>.
>This would keep all information about time values within <TstInfo> 
>and would be more in line with the claim that the time value 
>in the innermost token is the asserted value of existence.]
>
>For CMS processing rules, it would be best to let sub-profiles 
>specify a solution that is appropriate for their needs.  For example, 
>CMS services compatible with ANSI X9.95 may or may not require that 
>the submitted previous token be an ANSI X9.95 compliant token, 
>and they would place the previous token as an extension within 
>the CMS TSTInfo structure of the newly generated renewal token.
>
>Services that do not support renewal requests would just return 
>a NotSupported result code.
>
>For verify requests, the service need only verify the outer token
>and not deal with the inner previous token(s).  To completely verify 
>a renewal token and assert the time value in the innermost (oldest) token, 
>the client must access each successive inner token and submit 
>for each one a verify request that also specifies the time of issuance 
>of its immediately enclosing token.  To that effect, the DSS timestamping 
>profile needs to allow the VerificationTime additional input in verify 
>requests.
>
>Dimitri
>



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]