jason marshall wrote:
Maybe I'm misunderstanding the commentary made so far in this bug report.

If KeyInfo is indeed advisory, then how does one establish the
trustworthiness of an enveloped signature?

The relying (validating) party still needs to determine the trustworthiness of the KeyInfo material, or the key that it used to validate the signature (does the signing key actually belong to someone I trust?). For example if KeyInfo contains an X509Certificate then you shouldn't blindly trust the certificate, you need to determine if you trust the CA that issued that certificate - for example by building a chain of certificates from a trust anchor and validating the certificate chain (checking if certs have not been revoked, etc). XML Signature does not define how this is done, it is up to the application. However, there are CertPath APIs in the JDK which already help you do this: see http://java.sun.com/j2se/1.5.0/docs/guide/security/certpath/CertPathProgGuide.html
for more information.

--Sean


Thanks,
Jason

On 11/7/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
------- Additional Comments From [EMAIL PROTECTED] 2006-11-07 21:18 ------- An enveloped signature omits anything inside the Signature element apart from SignedInfo. KeyInfo is not commonly signed. The only attack possible is against broken software that doesn't understand that KeyInfo is advisory, not trusted
information.


--
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




Reply via email to