Thanks guys for great feedback!
Now I am feeling better in sticking with XML DSig. In the previous spec, we used XML DSig and turned out that most people did not implement/use it. If the community feels better about XML DSig now than several years ago, that is very reassuring. Thanks! =nat On Wed, 10 Jun 2009 08:44:06 -0700 (PDT), Zhihong <zhih...@gmail.com> wrote: > > SimpleSign had the same key rotation issue. Their solution is to add > another Based-64 encoded KeyInfo. That's problematic for us because > KeyInfo is part of XMLDSig and it's not trivial to process without a > library. So we implemented it without KeyInfo. To get around the key > rotation issue, we don't check expiration on the cert. We only have a > handful of partners using this and we accept the risks. > > Zhihong > > On Jun 10, 10:16 am, Love Hörnquist Åstrand <l...@kth.se> wrote: >> How do you handle multiple signatures to enable key migration (key >> rollover, new and signature algs) ? >> >> Love >> >> 9 jun 2009 kl. 23:43 skrev Nat Sakimura: >> >> > Hi all: >> >> > At XRI TC of OASIS Open, we are talking about the signing method for > >> > XRD. >> > The current trend in the TC is that to use a constrained form of XML > >> > DSig, >> > which is found in the SAML Core spec. We are almost deciding on it, >> > but I would like to hear from the community that if it would be OK. >> >> > The reason I ask this was that when we started to discuss the >> > signing method for XRD back in November last year, we were >> > hearing from the community that XML DSig is too complex and >> > hard to use by some developers. That's why we came up with >> > "Simple Sign" which basically signes the blob without any >> > cannonicalization. >> >> > e.g., >> >> > <SXRD sig="signature" > sigalg="http://www.w3.org/2000/09/xmldsig#rsa-sha1 >> > " certuri="pem file location" data="BASE64 of the payload" /> >> >> > Where: >> > XRD/@data : Base64 encoded XRD to be signed. >> > XRD/@sig : Signature taken over the original data (before Base64 >> > encoding). >> > XRD/@certuri: (Optional) Certificate location.Either XRD/@certuri or > >> > XRD/@certs MUST be present. >> > XRD/@certs : (Optional) The content of x...@certuri.if both XRD/ >> > @certuri and XRD/@certs are present, XRD/@certs takes precidence. >> > XRD/@sigalg : (Optional) Signature Algorithm. Defaults to rsa-sha1. >> >> > When we started writing spec on such thing, we found that we are re- >> > writing a lot of things that are already in XML DSig. >> > As the result, XML DSig with new canonicalization method=no- >> > canonicalization was discussed and in the end, >> > it seems the discussion precipitated to "After all, constrained XML >> > DSig would be good enough." >> > Theoretically, it looks good. >> >> > The remaining question is then the reality check, such as: >> > Is it widely implementable, in each scripting language and hosting >> > environment including Google AppEngine, Force.com, etc.? >> > Would the community feel that this is simple enough? >> > I would appreciate your insight/opinion/input into this matter. >> >> > Best, >> >> > -- >> > Nat Sakimura (=nat) >> >http://www.sakimura.org/en/ > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "OAuth" group. To post to this group, send email to oauth@googlegroups.com To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/oauth?hl=en -~----------~----~----~----~------~----~------~--~---