OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

egov message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: [egov] Re: Secure Workflow. Was: [egov] "Dry" and "Wet" signatures - A definition


I think that is where Anders began the discussion.


> -------- Original Message --------
> Subject: Re: [egov] Re: Secure Workflow. Was: [egov] "Dry" and "Wet"
> signatures - A definition
> From: Ed Chase <chase@adobe.com>
> Date: Mon, August 29, 2005 11:08 am
> To: John Messing <jmessing@law-on-line.com>
> Cc: Duane Nickull <dnickull@adobe.com>, eGov OASIS
> <egov@lists.oasis-open.org>, Anders Rundgren
> <anders.rundgren@telia.com>
> 
> John -
> 
> It seems that you're suggesting that you can establish authenticity 
> without identity. I would disagree. At some point you have to establish 
> trust with a system, individual, or organization through some means - 
> whether this is internal authentication or PKI digital ID it's the same 
> concept. Trust has to be established either explicitly or implicitly. 
> PKI signatures just offer the opportunity to extend authentication 
> beyond your own systems. While an ebXML registry could certainly 
> categorize the information in the messages, it doesn't really address 
> any issues of trust between the parties.
> 
> 
> With regard to secure transactions & PKI -
> 
> For transactions like the purchase order example that start internal and 
> later become external, why not use PKI from the start and employ policy 
> mapping between organizations or a bridge? Certificate policy mapping 
> (for limited sized communities) or a PKI bridge would give the trading 
> partners interoperability on both the authenticity and security fronts. 
> How about something like this:
> 
> 1) Include PKI policy-mapping with business partner agreements and/or 
> take advantage of a PKI bridge.
> 2) Create a your forms in PDF or an XHTML document variant that's based 
> on your industry standard for exchange - UBL or whatever.
> 3) Users complete the form or application and sign both presentation and 
> data with their digital identity. If it's a PDF, the signature is 
> embedded within the document, and you can also embed the revocation 
> status of your credential at sign-time for long-term validation.
> 4) Encrypt the document for the recipient's specific digital ID if 
> required and send the document
> 5) The document is protected regardless of transport. Having a PKI 
> relationship with your trading partner allows your signatures to be 
> validated by the recipient.
> 
> The majority of this can be automated. Signing and validation can be 
> server-centric if required. Everything you need for auditable long term 
> validity is self contained within the document and possessed by both 
> parties. The PKI layer is also self-contained and well removed from the 
> process. You don't have to worry about transport or individual 
> authentication requirements for different trading partners.
> 
> Ed
> -- 
> <http://www.adobe.com>Ed Chase
> Worldwide Standards
> Adobe Systems, Inc.
> chase@adobe.com
> 703.883.2830
> 
> John Messing wrote:
> 
> >A secure audit trail can be accomplished with tamper-evident
> >technologies and may have value even when a logical association with a
> >human or legal entity as a signer in a conventional sense is not
> >necessary or desired (e.g., to document log events securely). Where
> >such logical association with signers is required for purposes of legal
> >enforceability, then it can be considered as a subset of the secured
> >workflow generally. Componentizing documents into strings and metadata
> >can overcome many of the archival issues that have been alluded to but
> >rarely confronted directly. Tamper-evident technologies need not
> >include PKI, or even traditional digital signatures, but should take
> >into account recent Chinese contributions to hashing technologies and
> >their weaknesses. ebXML repository technology may prove to be very
> >useful in this context. Whether retention of copies of original
> >documents in original format will be required remains to be seen.
> >
> >The American Bar Association adopted guidelines in August 2005 for Court
> >Automation that incorporate many of these notions.
> >
> >John Messing
> >American Bar Association Science and Technology Law Representative to
> >OASIS and LegalXML-OASIS.
> >
> >  
> >
> >>-------- Original Message --------
> >>Subject: [egov] Re: Secure Workflow. Was: [egov] "Dry" and "Wet"
> >>signatures - A definition
> >>From: Duane Nickull <dnickull@adobe.com>
> >>Date: Mon, August 29, 2005 8:02 am
> >>To: Anders Rundgren <anders.rundgren@telia.com>
> >>Cc: eGov OASIS <egov@lists.oasis-open.org>
> >>
> >>Anders:
> >>
> >>I understand your intent better after this email.  My points are:
> >>
> >>1.Steps 2 and 3 of your secure workflow below are the only methodology 
> >>that should be employed.  One should not presume that any "document" 
> >>will never be modified and always perform some type of checksum() 
> >>operation before validating a signature.  The signed content should 
> >>always be auditable.
> >>
> >>2. There is no need to stop at the document level, DSig methodologies 
> >>are significantly complex today, even allowing signing of a partial 
> >>sub-set of a document.  Therfore, documents can contain both mutable and 
> >>immutable content.  Logically, if you only look at a "document" and some 
> >>part of it is mutable, you always have to declare the entire document 
> >>mutable.  I would advocate migrating from "document" to "content" or 
> >>components that make up a document in the thinking.
> >>
> >>3. An archive, checksum() implementation that provides a view of any 
> >>changes is also preferrable since not all changes to previously signed 
> >>content may be deemed to invalidate a signature.  This concept of 
> >>legality and material vs. immaterial changes to a contract exists in 
> >>many legal jurisdictions.  For example, if you sign a contract then 
> >>later change your postal code, that is probably insufficient to 
> >>invalidate the entire contract.
> >>
> >>Duane
> >>
> >>Anders Rundgren wrote:
> >>
> >>    
> >>
> >>>Duane,
> >>>I may have been unclear but my intention was not alluding that there 
> >>>any major security issues hidden here. 
> >>> 
> >>>For a universal signature/document system like Adobe's, these terms 
> >>>may indeed be flawed (or not apply) as you say.  A web-only signature 
> >>>scheme may though be differently architected and in such schemes the 
> >>>terms Dry and Wet terms are not entirely wrong.
> >>>
> >>>My personal preference is that a possible standards effort should only 
> >>>target Dry signatures as these (in a web environment NB), are more 
> >>>flexible due to the separation of "user views" (static documents in 
> >>>arbitrary formats), signatures, and possible associated transaction data.
> >>>
> >>>*Secure Workflow*
> >>> 
> >>>A further complexity is that few organizations including the US 
> >>>federal agencies have yet begun to look on how secure messaging is to 
> >>>be accomplished on a wider scale except by using e-mail.
> >>> 
> >>>However, e-mail has huge limitations for sophisticated (automated and 
> >>>interactive) workflow compared to web based systems where the 
> >>>"transaction" and the "view", are typically not using a common 
> >>>representation.  The latter of course has a major impact on how 
> >>>signatures can be utilized.
> >>> 
> >>>I have personally "toyed" with a number of use cases in order to clear 
> >>>the picture for myself (to begin with...).  One simple but still 
> >>>pretty universal such use-case is the e-purchasing process where one 
> >>>or more employees are running an internal workflow system where a 
> >>>purchase request is, after proper authorization, converted into a 
> >>>purchase order and sent to a supplier. 
> >>> 
> >>>My own take on the aforementioned e-purchasing process and using the 
> >>>web is as follows:
> >>> 
> >>>1. The user is (when he considers him as ready), presented a completed 
> >>>requisition proposal in for example HTML or PDF, which he is requested 
> >>>to sign and submit.   In the background the actual data is usually 
> >>>held by the web server session in a "computer-friendly" format.
> >>> 
> >>>2. After signature validation etc by the workflow system. the 
> >>>requisition is archived together with the user's signature for 
> >>>possible /future references/
> >>> 
> >>>3. Assuming the user is the final authorizer, a purchase order is now 
> >>>created in a B2B-network specific format (like UBL or EDI), based on 
> >>>the requisition data (kept in the web session).
> >>> 
> >>>4.  The completed purchase order is then archived in a table linked to 
> >>>the signed requisition for possible /future references/.
> >>> 
> >>>5.  Finally, the purchase order is secured[*] and sent away for 
> >>>fulfillment in a B2B-network defined way
> >>> 
> >>>Steps 2-5 are automatically performed by the workflow system 
> >>>(server).  Except for user signatures,/ the scheme above is the 
> >>>de-facto standard way of performing B2B operations/.
> >>> 
> >>>regards
> >>>Anders Rundgren
> >>>Working for a major US computer security company but here acting as an 
> >>>individual
> >>> 
> >>>*]  This part is unfortunately a major problem for many people working 
> >>>with PKI as /it is really the workflow system that creates, secures, 
> >>>and sends purchase orders to external suppliers/.  Due to this, 
> >>>existing [/and widely used/] B2B schemes are almost exclusively 
> >>>non-secured or are using shared secrets as such schemes (/in spite of 
> >>>being completely inferior/) seem to pass without major consideration, 
> >>>while "signing PKI-servers", immediately brings in the legal 
> >>>department ("a machine has no will or legal power"), the security 
> >>>experts ("this is violating end-to-end security"), and forces most 
> >>>such efforts into a dead halt.  A maybe vane hope, is that these very 
> >>>interesting issues will be properly "aired" when/if a web signature 
> >>>standards process is launched.
> >>>
> >>>----- Original Message -----
> >>>From: "Duane Nickull" <dnickull@adobe.com <mailto:dnickull@adobe.com>>
> >>>Cc: "eGov OASIS" <egov@lists.oasis-open.org 
> >>><mailto:egov@lists.oasis-open.org>>
> >>>Sent: Thursday, August 25, 2005 19:41
> >>>Subject: Re: [egov] "Dry" and "Wet" signatures - A definition
> >>>
> >>>
> >>>Anders et al:
> >>>
> >>>I will suggest you may want to think about this differently.  Many
> >>>signature mechanisms work in a way that mitigate the problem you are
> >>>hinting at without having to make this distinction.  Attempting to make
> >>>two classes of signature for mutable vs. immutable content is flawed IMO
> >>>since you would have to fully understand every possible way a document
> >>>or content *might* be modified.  This is simply beyond the grasp of any
> >>>group of people since there are so many variables (metadata changes,
> >>>versions, file names etc.) plus you are relying on third party vendor
> >>>statements to be 100% accurate.
> >>>
> >>>A better methodology is to stipulate that at the time of signing, a hash
> >>>is made of the exact content using state of the art algorithms and if
> >>>the content later changes, the signature block is flagged to indicate
> >>>that there have been changes since it was signed and let the actor
> >>>decide how they want to proceed.  Adobe Acrobat's signature method works
> >>>this way.  If for any reason, any of it changes, the signature
> >>>presentation is flagged to indicate such.  This method was perfected by
> >>>Adobe, RSA, Entrust, VeriSign, GeoTrust, and ActivCard.  There is a lot
> >>>of information available on this from our website:
> >>>http://www.adobe.com/security/digsig.html
> >>>
> >>>The attached file was signed, then changed to demonstrate this.  If you
> >>>go to the signature field, you can click on the triangle symbol by the
> >>>green check mark.  It will open a dialog window that tells you the
> >>>document is still the same, but the values themselves have been altered
> >>>since (this is important to distinguish between).  If you select
> >>>"signature properties", you get even more information.
> >>>
> >>>Under the summary, the window will note any changes.  If you select the
> >>>"document" tab, a modification details window appears.  There is a
> >>>button that allows you to generate a change log to compute modifications
> >>>subsequent to signing the document.  You can also select 'View Signed
> >>>Version' to see the version that was signed and compare the two documents.
> >>>
> >>>I agree that mutability detection algorithms are complex.  Our mechanism
> >>>was the result of numerous companies collaborating with customers to
> >>>ensure all legal and technical problems were solved.  This was a
> >>>somewhat lengthly process.
> >>>
> >>>Best wishes.
> >>>
> >>>Duane
> >>>
> >>>Anders Rundgren wrote:
> >>>
> >>>      
> >>>
> >>>>Dear list,
> >>>>In a previous posting where I referred to some discussions concerning
> >>>>a possible Web Sign standards effort within OASIS, "Dry" and "Wet"
> >>>>signatures were mentioned.  Several off-list messages indicate that
> >>>>these terms need a proper explanation.
> >>>>
> >>>>This comes to no big surprise as these terms have actually been coined
> >>>>by myself in the absence of an established terminology in this
> >>>>actually rather virgin field.
> >>>>
> >>>>*"Wet" web-signatures
> >>>>*An editable document, be it an MS Word document or an HTML form with
> >>>>edit fields, radio buttons etc. is filled-in and signed by the user
> >>>>and then sent to the service provider.
> >>>>
> >>>>*"Dry" web-signatures*
> >>>>The user is (after an arbitrary interactive process with a service
> >>>>provider), presented, a static (read-only) document and is requested
> >>>>to sign it in order to indicate "acceptance".  Since the document
> >>>>actually comes from the service provider, the result sent to the
> >>>>service provider is typically only a detached signature of the shown
> >>>>document.
> >>>>
> >>>>*Further comments*
> >>>>These schemes represent two different schools, one which tries to
> >>>>mimic the existing paper form world, while the other scheme is more
> >>>>aligned with how the web is currently used.
> >>>>
> >>>>*Implications*
> >>>>Superficially these schemes may appear similar, but that is indeed not
> >>>>the case; there is probably a 10-to-1 difference in complexity unless
> >>>>you restrict "Wet" signatures to only support a single document
> >>>>format.  The reason for this increase in complexity is that each
> >>>>document format has its own native signature format (or has no defined
> >>>>signature format at all), as well as its own input data validation
> >>>>scheme.  Using "Dry" detached signatures, you can achieve the same
> >>>>thing as S/MIME does, namely document format independence with respect
> >>>>to the signature process (except for some trivial canonicalizations). 
> >>>>Possible input data validation is assumed to have been carried out in
> >>>>earlier phases of a web session, using standard web methodology. 
> >>>>There are numerous other implications as well concerning the use of
> >>>>"Wet" and "Dry" signatures, but these are far outside the range of an
> >>>>e-mail posting.
> >>>>
> >>>>Anders Rundgren
> >>>>Working for a major US computer security company but here acting as an
> >>>>individual
> >>>>        
> >>>>
> >>>
> >>>
> >>>--------------------------------------------------------------------------------
> >>>
> >>>
> >>>---------------------------------------------------------------------
> >>>To unsubscribe from this mail list, you must leave the OASIS TC that
> >>>generates this mail.  You may a link to this group and all your TCs in 
> >>>OASIS
> >>>at:
> >>>https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php
> >>>      
> >>>
> >>---------------------------------------------------------------------
> >>To unsubscribe from this mail list, you must leave the OASIS TC that
> >>generates this mail.  You may a link to this group and all your TCs in OASIS
> >>at:
> >>https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php
> >>    
> >>
> >
> >
> >---------------------------------------------------------------------
> >To unsubscribe from this mail list, you must leave the OASIS TC that
> >generates this mail.  You may a link to this group and all your TCs in OASIS
> >at:
> >https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php 
> >
> >
> >  
> >



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]