OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

ebxml-cppa message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: RE: Security - question about nonrepudiation


Marty,


I was reading the risk assessment and that is what started this.  I do think
we need to address, in the CPP/A, how to indicate what the signature is
applied to - header, body, attachment, entire thing - but I don't see how
the nonrepudiation elements adds something new.

What I was wondering is if we define the document exchange details, like
nonrepudiation (digital signature) and digital envelope (encryption) don't
they cover all of the requirements already?  Even the existing delivery
channel definition does not need the nonrepudiation element as it covers the
signature requirement via the authenticated element.  In the delivery
channel definition, IMHO, the authenticated and nonrepudiation elements are
redundant.

I was mostly trying to get some discussion started on some of these areas
within security.

	Tim 

-----Original Message-----
From: Martin W Sachs [mailto:mwsachs@us.ibm.com]
Sent: Tuesday, July 31, 2001 3:41 PM
To: Collier, Timothy R
Subject: Re: Security - question about nonrepudiation



Tim,

The attributes in the BPSS instance document don't say anything about how
to actually do nonrepudiation.  The CPP/CPA is precisely where the two
partners agree on what standard to use (actually XML DSIG is the only one
we support) and various details of XML DSIG such as certificates, signature
algorithm, transforms, etc.

There are some questions as to whether what is in the CPP/CPA is correct
and whether it is comprehensive enough to, for example, cover the
application-level response, signing of payload vs signing of the entire
message,  and the signals that may need to be signed.  Some of these
questions are covered in my new.work document and the previous Changes
document.  Others may be called out in the ebXML Risk Assessment document.
It does need a thorough going over.

Regards,
Marty

****************************************************************************
*********

Martin W. Sachs
IBM T. J. Watson Research Center
P. O. B. 704
Yorktown Hts, NY 10598
914-784-7287;  IBM tie line 863-7287
Notes address:  Martin W Sachs/Watson/IBM
Internet address:  mwsachs @ us.ibm.com
****************************************************************************
*********



"Collier, Timothy R" <timothy.r.collier@intel.com> on 07/31/2001 05:25:40
PM

To:   ebxml-cppa@lists.oasis-open.org
cc:
Subject:  Security -  question about nonrepudiation




All,

     If two parties agree on complimentary roles within a process
specification, and agree on the document properties (in particular signing)
don't the nonrepudiation elements in the delivery channel characteristics
become superfluous?  After all, the parties have agreed on a process
specification that includes acknowledgement of receipt, and they have
agreed
on which documents have signatures attached (in the document exchange).  To
me NRR sounds like a requirement on the BP, and NRO is a document
requirement for digital signature.
     I have heard that the delivery channel is an implementation
convenience, which is ok, but it seems even for that the authenticated tag
covers the digital signature requirement. And the implementation already is
monitoring the runtime process according to the BPSS.
     Do you think the nonrepudiation tags in the delivery channel express
unique requirements that are not already covered?


     Tim


------------------------------------------------------------------
To unsubscribe from this elist send a message with the single word
"unsubscribe" in the body to: ebxml-cppa-request@lists.oasis-open.org





[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC