Jeff,

Actually, after second thought you have my +1.  The Sun
LDAP classification is a nit.

Thanks,

John


John Fischer wrote:
> Jeff,
> 
> According to the sunldap case that you site the LDAP
> interface was declared Evolving.  This translates into
> either Uncommitted or Committed depending.  Since this
> was reviewed by PSARC it is most likely Committed but
> check with someone from the Sun LDAP team.
> 
> After that you have my +1.
> 
> Thanks,
> 
> John
> 
> 
> Qing-Ming Jeff Cai wrote:
>> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI
>> This information is Copyright 2009 Sun Microsystems
>> 1. Introduction
>>     1.1. Project/Component Working Name:
>>      Seahorse Update and Seahorse Plugins
>>     1.2. Name of Document Author/Supplier:
>>      Author:  Jeff Cai
>>     1.3  Date of This Document:
>>     02 November, 2009
>> 4. Technical Description
>> This information is Copyright 2008 Sun Microsystems
>> 1. Introduction
>>     1.1. Project/Component Working Name:
>>      Seahorse Update and Seahorse Plugins for OpenSolaris
>>     1.2. Name of Document Author/Supplier:
>>      Author:  Jeff Cai
>>     1.3  Date of This Document:
>>     21 October, 2009
>> 4. Technical Description
>> 1. Introduction
>>    1.1. Project/Component Working Name:
>>
>>         Seahorse Update and Seahorse Plugins
>>
>>    1.2. Name of Document Author/Supplier:
>>                 Author:         Jeff Cai
>>         Sponsor:        Jeff Cai
>>
>>    1.3. Date of This Document:
>>
>>         10/29/2009
>>
>>    1.4. Name of Major Document Customer(s)/Consumer(s):
>>
>>         1.4.1. The PAC or CPT you expect to review your project:
>>
>>                 Solaris PAC
>>
>>         1.4.2. The ARC(s) you expect to review your project:
>>
>>                 LSARC
>>
>>         1.4.3. The Director/VP who is "Sponsoring" this project:
>>
>>                 Robert O'Dea
>>
>>         1.4.4. The name of your business unit:
>>
>>                 Software - OPG
>>
>>    1.5. Email Aliases:
>>             1.5.1. Responsible Manager:  harry.lu at sun.com
>>             1.5.2. Responsible Engineer: jeff.cai at sun.com
>>             1.5.3. Marketing Manager:    glynn.foster at sun.com
>>             1.5.4. Interest List:        brian.cameron at sun.com
>>                                          darren.moffat at sun.com
>>                                          wyllys.ingersoll at sun.com
>>
>> 2. Project Summary
>>    2.1. Project Description:
>>
>>    Seahorse is a GNOME application for managing SSH, PGP keys and 
>> GNOME    keyrings.
>>    This update enables PGP support of Seahorse after GnuPG's integration.
>>    Thus with Seahorse a user can create and manage PGP keys.
>>
>>    Seahorse Plugins integrates with nautilus and gedit for    
>> encryption/decryption  operations.
>>
>>    After GnuPG's integration, the PGP security support is also enabled 
>> in    Evolution.
>>
>>    Please refer to sections below for more information about how GnuPG
>>    is used in Nautilus, gedit, and Evolution.
>>
>> 4. Technical Description:
>>
>>    As a frontend of GnuPG, all operations on PGP keys are implemented 
>> by GnuPG    or GPGME.
>>       After enabling PGP supports in Seahorse, following new features 
>> are added.
>>
>>    4.1 Create and Manage PGP keys
>>
>>     To create a PGP key using seahorse, the user needs to give a 
>> description      of what the key is to be used for. The user needs to 
>> specify the     encryption type (DSA Elgamal, RSA or DSA),     the key 
>> strength (768-4096) and the passphrase for the key.
>>     The user can list or delete PGP keys. The user can also change the 
>>     passphrase for them.
>>
>>     Seahorse invokes the interface functions provided by GPGME or 
>> 'gpg' command
>>     line to  finish all these operations.
>>
>>     4.2 Exporting and Importing PGP Keys
>>
>>     Seahorse can import PGP keys from the clipboard or a key file the 
>> same way     as SSH keys.
>>     Seahorse allows users to specify a PGP key file. Then Seahorse 
>> invokes APIs
>>     provided by GPGME to import the key.
>>
>>     Users can also export PGP private or public keys to files.
>>     4.3 Signing the key
>>
>>     Seahorse allows a user to sign a public PGP key with a private PGP 
>> key.     It also provides UI to allow the user to revoke it.
>>
>>     4.4 Retrieve PGP public keys from servers or publish them to servers
>>
>>     Keeps the user's and other's keys up to date by syncing keys 
>> periodically
>>     with remote key servers. Syncing will make sure that the user has 
>> the     latest signatures made on all of the keys so that the web of 
>> trust
>>     will be the most useful.
>>
>>     Seahorse provides support for HKP and LDAP key servers.
>>
>>     HKP Servers
>>        HKP keyservers are ordinary web based keyservers such as the 
>> popular
>>        hkp://pgp.mit.edu:11371, also accessible at http://pgp.mit.edu.
>>        Seahorse uses libsoup to access HKP servers.
>>
>>     LDAP Keyservers
>>        LDAP keyservers are less common, but use the standard LDAP 
>> protocol
>>        to serve keys. ldap://keyserver.pgp.com is a good LDAP server.
>>        Seahorse uses sunldap to access LDAP servers.
>>
>>     4.5 Seahorse plugin for gedit
>>
>>     This plugin adds three menu items in the gedit's 'Edit' menu:
>>     Sign, Decrypt/Verify and Encrypt.
>>
>>     These menu options allow the user to sign/verify or 
>> encrypt/decrypt the     selected text.
>>
>>     As a client of seahorse-daemon, it calls DBus interfaces provided in
>>     seahorse-daemon to finish all operations.
>>
>>     4.6 Seahorse plugin for Nautilus
>>
>>     This plugin enables the user to sign/verify or encrypt/decrypt
>>     files in Nautilus.
>>
>>     After a file is signed or encrypted in Nautilus, a file with the same
>>     name but with a pgp or sig extension will be created.
>>     The user can also verify/decrypt the file in Nautilus.
>>
>>     Nautilus calls a command line helper program 'seahorse-tool' which 
>> uses
>>     GPGME to finish the encryption operations.
>>
>>     4.7 Encryption settings
>>
>>     The user can use seahorse-preferences to configure some settings 
>> which
>>     include:
>>  
>>     * Default Key
>>
>>       This is the key that will be used by applications and plugins to 
>> sign
>>       files. It will also be the key that files will be encrypted to if
>>       encrypt to self is selected.
>>
>>       The default key id is saved in gconf
>>       ~/.gconf/desktop/pgp/default_key
>>
>>     * When encrypting, always include myself as a recipient
>>
>>       If the user does not select this checkbox, then the user is not 
>> included
>>       as a recipient, he will not be able to decrypt any files he 
>> encrypts.
>>
>>       Sometimes the file will be encrypted using the other person's 
>> public key,
>>       then the file may be shared with that person in many ways such 
>> as email,       a website, USB drive or IM messenger. If the sender 
>> just wants to send
>>       an encrypted file and he still has the non-encrypted copy, he 
>> doesn't
>>       need to encrypt to self.
>>
>>       This setting is saved in gconf and its default value is 'true'.
>>
>>     4.8 Passphrase cache
>>
>>        seahorse-agent helps the user cache the passphrase so that the 
>> user        can perform many operations that require entering the 
>> passphrase without        re-entering it every time.  It takes place 
>> of gpg-agent.
>>
>>        There are several configurations for the passphrase cache:
>>
>>           * Never remember passphrases,           * Remember 
>> passphreases for ... minutes,
>>           * Always remember passphrases whenever logged in
>>           * Ask me before using a cached passphrase
>>
>>     4.9 Encryption Applet
>>
>>        Encryption Applet performs the various encryption operations using
>>        standard OpenPGP methods. It operates on both the Ctrl-C/V and 
>> the        select/middle click clipboards. Simply copy the desired 
>> text using
>>        the method of the user's choice, select the encryption 
>> operation from
>>        the left click menu, follow the prompts and paste the new contents
>>        of the clipboard into your application or view them in a display
>>        window.
>>
>>     4.10 Enable PGP security for Evolution
>>        With the integration of GnuPG, PGP security is enabled in 
>> Evolution.
>>        The user can sign/verify or encrypt/descrypt email messages.
>>
>>        Evolution calls 'gpg' command line to finish all the operations.
>>     
>>     4.11 Interfaces:
>>
>>          Following interfaces will be added:
>>
>>          Exported Interfaces
>>            Interface                        Classification      Comments
>>          ---------------                    -------------- 
>> ------------------
>>          SUNWseahorse-plugins                Uncommitted    Package 
>> name          SUNWseahorse-plugins-root           Uncommitted    
>> Package name
>>          ~/.gconf/desktop/pgp             Volatile       Config file 
>> for seahorse-preferences.
>>
>>
>>          /usr/bin/seahorse-agent         Volatile       seahorse GPG 
>> agent for caching 
>>                                                         PGP passphrase.
>>
>>          /usr/bin/seahorse-preferences   Volatile       preferences 
>> for configuring encryption
>>                             and passphrases cache.                   
>> /usr/bin/seahorse-tool          Volatile       a helper program that 
>> will encrypt/decrypt
>>                                                         or sign/verify 
>> a file
>>
>>          /usr/lib/bonobo/servers/
>>            GNOME_SeahorseApplet.server   Volatile       the bonobo 
>> file for seahorse applet
>>
>>          /usr/lib/gedit-2/plugins/ligseahorse-pgp.so
>>                                          Volatile       seahorse 
>> plugin library for gedit
>>
>>          /usr/lib/gedit-2/plugins/seahorse-pgp.gedit-plugin
>>                                          Volatile       seahorse 
>> plugin description file for gedit
>>          /usr/lib/nautilus/extensions-2.0/
>>             libnautilus-seahorse.so      Volatile       the library 
>> file of seahorse plugin for Nautilus
>>          /usr/lib/seahorse/seahorse-applet
>>                                          Volatile       seahorse applet
>>
>>          /usr/share/applications/seahorse-pgp-encrypted.desktop
>>                                          Volatile
>>                                                         desktop file 
>> for mime type 'application/pgp-encrypted'
>>          /usr/share/applications/seahorse-pgp-keys.desktop
>>                                          Volatile
>>                                                         desktop file 
>> for mime type 'application/pgp-keys'
>>
>>          /usr/share/applications/seahorse-pgp-prepferences.desktop
>>                                          Volatile
>>                                                         desktop file 
>> for seahorse-preferences
>>
>>          /usr/share/applications/seahorse-pgp-signature.desktop
>>                                          Volatile
>>                                                         desktop file 
>> for mime type 'application/pgp-signature'
>>
>>          /usr/share/doc/SUNWseahorse-plugins/*          
>>                                          Volatile       doc files for 
>> seahorse plugins
>>
>>          /usr/share/man/man1/seahorse-*                
>>                                          Volatile       man pages
>>
>>          /usr/share/mime/packages/seahorse.xml          
>>                                          Volatile       a file defines 
>> new mime types
>>
>>          /usr/share/seahorse-plugins/glade/*            
>>                                          Project Private  glade files
>>
>>          /etc/gconf/schemas/seahorse-gedit.schemas      
>>                                          Volatile       seahorse 
>> plugin schema file for gedit
>>
>>          /etc/gconf/schemas/seahorse-plugins.schemas    
>>                                          Volatile       schema file of 
>> seahorse-agent and seahorse-applet
>>                   Imported Interfaces
>>            Interface              Classification     Comments
>>          ---------------        --------------- -----------------------
>>            GnuPG                   Uncommitted       PSARC/2009/397 
>>            GPGME                   Uncommitted       PSARC/2009/397 
>>            sunldap                 Volatile          PSARC/1997/276 
>>            libsoup                 Volatile          LSARC/2003/298 
>>            libgpg-error            Volatile          LSARC/2008/207 
>>                4.12 Packaging & Delivery:
>>                  Two new packages are delivered.          
>> SUNWseahorse-plugins          SUNWseahorse-plugins-root
>>
>>     4.13 Security Impact:
>>             Seahorse is just a GUI front-end GnuPG, so all encryption 
>> related tasks     are managed by GnuPG.
>>
>>     Seahorse syncs public keys with key servers using the protocols 
>> LDAP and     HKP. The communication with the server is not encrypted.
>>     It is the user's responsibility to ensure the public key is valid 
>> or     trusted.
>>
>>     Seahorse and Seahorse Plugins, like all GUI programs, depends on 
>> Xauth     security.
>>     These tools under review do not save sensitive information to 
>> files     directly. Instead, GnuPG does.
>>
>>     4.9 Dependencies:
>>             Seahorse depends on GnuPG and GPGME to operate on PGP keys.
>>     Seahorse depends on sun ldap and libsoup to access key servers.
>>          5. References
>>         [1] Seahorse DBus Interfaces:
>>             http://live.gnome.org/Seahorse/DBus
>>         [2] Project page:
>>             http://www.gnome.org/projects/seahorse
>> 6. Resources and Schedule
>>     6.4. Steering Committee requested information
>>        6.4.1. Consolidation C-team Name:
>>         Desktop
>>     6.5. ARC review type: FastTrack
>>     6.6. ARC Exposure: open
>>
>>
>> 6. Resources and Schedule
>>     6.4. Steering Committee requested information
>>        6.4.1. Consolidation C-team Name:
>>         OSD
>>     6.5. ARC review type: FastTrack
>>     6.6. ARC Exposure: open
>>

Reply via email to