Tim Churches wrote: > Thomas Beale wrote: > >> Let me pose the question another way: >> >> * what standard or other open specification can openEHR point to that >> accurately specifies the format of digital digests and signatures of EHR >> data? It has to be something avalable to everyone, and implementable >> (preferably already implemented)? >> > > Surely one (or more) of the X.509 pkix RFCs covers this? See > http://www.ietf.org/html.charters/pkix-charter.html > > Or the very widely used and implemented RSA Labs PKCS "standards" - see > http://en.wikipedia.org/wiki/PKCS > we might be discussing at cross purposes here Tim - at the moment, we want to achieve one very simple thing in openEHR: specify (by pointing to some published specification) the contents of digital signatures and hashes as we want to use them in openEHR (which is to say: in a completely orthodox fashion). My main concern is that there be a specification which shows how multiple encryption, hashing, compression etc algorithms can be used together in a reliable way, so that both encoder and decoder are guaranteed to be able to write and read the data, verify digests, authenticate authors and so on. So while there are all these standards for dozen well-known encryption algorithms, another dozen digital signature algorithms, various compression algorithms, etc etc, I believe we need to be able to say how they are all used together. openPGP seems to do a good job of this.
This issue of how to mechanically sign etc is one aspect of a full security infrastructure. Clearly, if there is digital signing with private and public keys, there needs to be key management and certification....all I want to recognise is that we should not (I don't think) solve both issues at once - we should solve them relatively independently - in other words, if all the e-Health programmes decide in 2 years time to go with some particular kind of PKI then we can do it, regardless of what choices we make now for digital signature. If we end up using X.509 certificates, great. But we still need a specification for the actual hashing and signing strings that get created and stored with the data or sent in messages. It may be that we do need to have the debate about "how does openEHR integrate with PKI etc"; if so, my hope is that we can treat it relatively independently from the more basic subject above, allowing us to at least make the models security-enabled / aware without having to solve the PKI problem first. > And I dare say that the openSSL library implements whichever one of > these standards is relevant. Sorry, no time to research exactly which > standard you should look at, and its not the sort of information I like > to have hanging around in my cranium (if I can help it). > > PGP/GPG is fab but mention it is not "enterprise-friendly" - mention it > in any large corporate setting and the IT people will wrinkle their > noses and claim not to have heard of it or mutter disparaging remarks > about hackers who ought to be in gaol. Whether they would react the same > way to the mere use of a GnuPG signature format is another question, but > if you mention X.509, PKCS or pkix compliance then there will be nods > and smiles all round from the corporate IT guys. > Sure - but as I have said before I don't believe that using openPGP message format (RFC2440) that we are advocating or pre-supposing any particular key management infrastructure (I am happy to be shown wrong...). So - openPGP is a straw man option for interoperable signature and hash fields in data (there are only 2 or 3 in the whole reference model). What is the alternative? X.509 doesn't specify the way to sign things... - thomas

