OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

ws-dd message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: [ws-dd] DPWS Security changes


Regrets for todays call but here are some comments:

line 89 - I don't think that the WSU namespace should be removed as it seems that the timestamp elements are used
line 145 - I don't think that the WS-Security reference should be removed (it should be updated though) as the processing of the reconstructed message can follow the WS-Security processing
line 941 - HTTP could provide basic authentication and could be used if someone provided other technology that meets the rest of the requirements,
line 949 - SHA2 should be considered here
line 959 - connection level should be transport level
line 960 - compact signature only allows you to determine who signed the message, it may not be the originator
line 963 - TLS will only allow point to point so if there is an intermediary, this breaks. Also confidentiality is only achieved if the proper cipher suites are used, same with origin authentication
line 971 - does the x.509 v3 have to have the proper key usage ?
line 979 - integrity does not protect, its only a way to detect a change
line 982 - R4000 is this a on wire only requirement only ?
line 990 - R4001 Does this include faults ?
line 995 - Would change Secure Channel to Secure Transport
Line 1001 - R4002 is this an on the wire requirement only ?
Line 1003 - R4067 this may be hard as if the transport security is being used it may be unencrypted before the processing engine gets the message and thus no one may know if the message was encrypted Line 1005 - no idea what a confidential message really is
line 1024 - I don't see any difference between R4004 and R4007, and don't see why R4007 is under Trust section
line 1028 - I think R4008 is wrong as HTTP basic auth could be used and that is not at the lower network layer

More to follow, not all the way through this yet

Anthony Nadalin | Work 512.838.0085 | Cell 512.289.4122

Inactive hide details for Dan Driscoll ---01/07/2009 11:18:51 PM---Thanks for the feedback, Antoine!Dan Driscoll ---01/07/2009 11:18:51 PM---Thanks for the feedback, Antoine!


From:

Dan Driscoll <Dan.Driscoll@microsoft.com>

To:

"antoine.mensch@odonata.fr" <antoine.mensch@odonata.fr>, "ws-dd@lists.oasis-open.org" <ws-dd@lists.oasis-open.org>

Date:

01/07/2009 11:18 PM

Subject:

RE: [ws-dd] DPWS Security changes





Thanks for the feedback, Antoine!

I incorporated all changes except a few minor notes:
* One comment you had said that we should distinguish "DEVICE" by saying "DEVICEs that conform to this security profile."  If we did, I think we would have to change most (all?) instances in this section--I think it is far more effective to allow the composition text at the beginning make it clear: all of Section 7 is optional and must be applied in entirety.
* The case of an unsecure DEVICE and a secure HOSTED SERVICE is an unusual one, and in cases where it's used, I think we should classify that as a separate security profile entirely, instead of trying to accommodate it in this profile.

Everyone, please see the updated text.  You may reply with the original text, or this one--if you haven't yet started reviewing, please use the latest version.

Issues addressed in this draft:
032: Describe security composability
051: Generalize security
112: Remove WS-Security reference
113: Cleanup Network Model
114: Remove security negotiation
115: Replace R4070 with switches on HTTPS ID/xAddrs
138: Create introduction and concrete description of security profile
139: Remove protocol negotiation
140: Clean up HTTP Authentication

Thanks
--D

-----Original Message-----
From: Antoine Mensch [
mailto:antoine.mensch@odonata.fr]
Sent: Monday, January 05, 2009 4:27 AM
To: ws-dd@lists.oasis-open.org
Subject: Re: [ws-dd] DPWS Security changes

Hi Dan and all,

Please find enclosed a version of the document annotated with comments.
As the comments author is lost when saving the doc, I have prefixed all my comments with AM. Besides minor editorial issues, I have two major concerns with the current version:
1) it does not really clarify the security model for HOSTED SERVICEs:
most requirements still refer to DEVICEs, although the spec mentions that control and eventing messages (that normally apply to HOSTED
SERVICEs) should use the Secure Channel established for the DEVICE. I think the intent is that HOSTED SERVICEs delegate the establishment the security association to the DEVICE and then use the secure channel established between DEVICE and CLIENT, but it should be made clearer in the spec.
2) The removal of requirements R4028 and R4069 adds uncertainty to the
spec: it becomes more difficult to understand with feature is optional and which one is mandatory. I think we should explicitly say that TLS with both server and client certificates is the preferred approach, but that HTTP Basic Authentication can be used as a mandatory minimal fallback mechanism when client certificates are not practically feasible.

Cheers

Antoine

Dan Driscoll a écrit :
>
> Hi all-
>
> Please see my proposed changes for the DPWS Security issues.  The
> following issues are addressed in this proposal:
>
>     * 032: Describe security composability
>     * 112: Remove WS-Security reference
>     * 113: Cleanup Network Model
>     * 114: Remove security negotiation
>     * 115: Replace R4070 with switches on HTTPS ID/xAddrs
>     * 138: Create introduction and concrete description of security
>       profile
>     * 139: Remove protocol negotiation
>     * 140: Clean up HTTP Authentication
>
>
>
> Note that although change tracking is enabled, the document is much
> easier to read with tracking disabled.
>
>
>
> Thanks
>
> --D
>
> ----------------------------------------------------------------------
> --
>
> ---------------------------------------------------------------------
> To unsubscribe from this mail list, you must leave the OASIS TC that
> generates this mail.  Follow this link to all your TCs in OASIS at:
>
https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php
> ----------------------------------------------------------------------
> --
>
>
> No virus found in this incoming message.
> Checked by AVG -
http://www.avg.com
> Version: 8.0.176 / Virus Database: 270.10.2/1872 - Release Date:
> 02/01/2009 13:10
>
>
(See attached file: wsdd-dpws-1.1-spec-wd-03-security.docx)---------------------------------------------------------------------
To unsubscribe from this mail list, you must leave the OASIS TC that
generates this mail.  Follow this link to all your TCs in OASIS at:
https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php 

wsdd-dpws-1.1-spec-wd-03-security.docx



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]