I have not worked with digital signatures using PGP. I'm not sure where the sample's PGP could have come from.
On Sat, Jan 11, 2014 at 12:59 PM, Alex O'Ree <spyhunte...@gmail.com> wrote: > Jess > > By any chance you have experimented with using PGP keys to sign xml? I > see in the source trunk that there are a few examples of signed xml > using pgp, but I have no idea how they were generated. Thanks > > Alex > > On Sat, Mar 30, 2013 at 1:05 PM, Kurt Stam <kurt.s...@gmail.com> wrote: > > I think I prefer option 1. It's much harder to support client side key > stores. > > > > my 2 cents > > > > --Kurt > > > > Sent from my iPad > > > > On Mar 30, 2013, at 11:15 AM, "Alex O'Ree" <spyhunte...@gmail.com> > wrote: > > > >> So provided i can figure out the transforms, I've ran into an issue > >> that I need some input on. > >> > >> From a thick client, if they recieve a signed uddi entity and valid > >> it, trust would assumed to be available from the local machine or from > >> a user provided trust store. No problem. > >> > >> From a thin client, such as the new web gui I'm working on, what makes > >> the most sense to use as a trust store? I'd like to have a browser > >> message stating whether or not the signature is valid and if the cert > >> is trusted and still valid timewise and if it hasn't been revoked > >> (perhaps via OCSP/CRL). Options are: > >> 1) A server side provided trust store > >> 2) An applet that relies on access to a client side trust store > >> 3) Some combination of the two > >> > >> > >> > >> On Sat, Mar 23, 2013 at 7:59 AM, Alex O'Ree <spyhunte...@gmail.com> > wrote: > >>> I'm inclined to say both client and server. Probably called directly > >>> from the example > >>> > >>> On Fri, Mar 22, 2013 at 10:42 PM, Kurt Stam <kurt.s...@gmail.com> > wrote: > >>>> Seems reasonable, would this be a dependency on the client or server > side, or both? > >>>> > >>>> Well we be using it directly or behind an interface? > >>>> > >>>> -Kurt > >>>> > >>>> On Mar 22, 2013, at 20:33, "Alex O'Ree" <spyhunte...@gmail.com> > wrote: > >>>> > >>>>> I'd like to make a suggestion. Include Apache Santuario has a client > >>>>> dependency. It provides a well tested digital signature and > validation > >>>>> capabilities, is well document and has a number of samples that would > >>>>> be a perfect addition for providing signatures for UDDI registries. > >>>>> Any other opinions? > >>>>> > >>>>> On Tue, Mar 19, 2013 at 8:02 PM, Kurt T Stam <kurt.s...@gmail.com> > wrote: > >>>>>> Signing just the entity seems to make the most sense to me too. > >>>>>> > >>>>>> my 2 cents > >>>>>> > >>>>>> --K > >>>>>> > >>>>>> > >>>>>> On 3/19/13 12:41 PM, Alex O'Ree wrote: > >>>>>>> > >>>>>>> Perhaps it would make more sense to sign just the entity. That is, > a > >>>>>>> business signed by Cert A, then signed by Cert B. Cert B's > signature > >>>>>>> is only a hash of the business entity itself, not inclusive of Cert > >>>>>>> A's signature. At least this way its slightly more modular. In > order > >>>>>>> to validate the signature, the signature elements would have to all > >>>>>>> removed, then one at a time, inserted for validation > >>>>>>> > >>>>>>> On Mon, Mar 18, 2013 at 10:48 PM, Jesse Sightler > >>>>>>> <jesse.sight...@gmail.com> wrote: > >>>>>>>> > >>>>>>>> I see you are now well on your way down the rabbit hole that is > digital > >>>>>>>> signatures with UDDI. :) > >>>>>>>> > >>>>>>>> Basically, all of your concerns are valid. It is possible to sign > a > >>>>>>>> business > >>>>>>>> w/o any transformation, and then later sign a service within the > >>>>>>>> business, > >>>>>>>> exactly as you have described. This will invalidate the business' > entire > >>>>>>>> signature, until it is rewritten. I suspect that any entity saved > by a > >>>>>>>> third > >>>>>>>> party UDDI client would also present issues within the current > JUDDI > >>>>>>>> architecture, without a fairly sophisticated transform being used. > >>>>>>>> > >>>>>>>> Ultimately, in order to avoid both issues, you will have to make > sure to > >>>>>>>> sign with a transformer that is appropriate for your use-case. > XSLT > >>>>>>>> transforms are generally a good place to start, IMO, and it would > be > >>>>>>>> reasonable to write a standard transform that only signed the > elements > >>>>>>>> that > >>>>>>>> made up the "business" meaning being stored within JUDDI. That is > really > >>>>>>>> what I would recommend if you want to make this really easy to > use. > >>>>>>>> > >>>>>>>> > >>>>>>>> On Mon, Mar 18, 2013 at 9:10 PM, Alex O'Ree < > spyhunte...@gmail.com> > >>>>>>>> wrote: > >>>>>>>>> > >>>>>>>>> Jesse > >>>>>>>>> > >>>>>>>>> Have you ran into the multiple signatures on a uddi entity? > Consider > >>>>>>>>> the following scenario: > >>>>>>>>> 1) business 1 signed by Cert A > >>>>>>>>> 2) business 1 signature is validated - ok > >>>>>>>>> 3) business 1 is also signed by Cert B, > >>>>>>>>> 4) business 1 signature validation fails > >>>>>>>>> > >>>>>>>>> I think whats happening is that when the entity is signed by B, > the > >>>>>>>>> signature of A is included in the 2nd signature. The other > possibility > >>>>>>>>> is that the validation code has the wrong transform or that the > >>>>>>>>> signatures need to be validated in a specific order. > >>>>>>>>> > >>>>>>>>> The real question is, should Cert B's signature be inclusive or > >>>>>>>>> exclusive of Cert A's signature? This effects both the signing > and > >>>>>>>>> validation portions > >>>>>>>>> > >>>>>>>>> On Mon, Mar 18, 2013 at 4:27 PM, Alex O'Ree < > spyhunte...@gmail.com> > >>>>>>>>> wrote: > >>>>>>>>>> > >>>>>>>>>> Yes, that's sort of a must have IMO. Basically, I'm setting it > up for > >>>>>>>>>> either JKS or Windows cert stores, all parameters are set via > HashMap > >>>>>>>>>> or potentially a properties file. Since there's such a variety > of dsig > >>>>>>>>>> settings, all of them will be configurable. > >>>>>>>>>> > >>>>>>>>>> On Mon, Mar 18, 2013 at 11:54 AM, Jesse Sightler > >>>>>>>>>> <jesse.sight...@gmail.com> wrote: > >>>>>>>>>>> > >>>>>>>>>>> I assume that you will be changing it to use a truststore for > >>>>>>>>>>> validation > >>>>>>>>>>> (certificate chain validation)? Ie, there has to be some step > to > >>>>>>>>>>> insure > >>>>>>>>>>> that > >>>>>>>>>>> the cert within the signature itself is a trusted cert. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> On Mon, Mar 18, 2013 at 11:49 AM, Alex O'Ree < > spyhunte...@gmail.com> > >>>>>>>>>>> wrote: > >>>>>>>>>>>> > >>>>>>>>>>>> thanks for the reply. I've since figured it out and I'm > working on > >>>>>>>>>>>> moving the relevant code into the juddi-client project to > make it a > >>>>>>>>>>>> bit more functional from an end user/dev perspective. I'm also > >>>>>>>>>>>> working > >>>>>>>>>>>> on removing the requirement for specifying the certificate > when > >>>>>>>>>>>> validating a signature, since the x509 cert is included with > the > >>>>>>>>>>>> signature already. > >>>>>>>>>>>> > >>>>>>>>>>>> On Sun, Mar 17, 2013 at 11:25 PM, Jesse Sightler > >>>>>>>>>>>> <jesse.sight...@gmail.com> wrote: > >>>>>>>>>>>>> > >>>>>>>>>>>>> Hi Alex, > >>>>>>>>>>>>> > >>>>>>>>>>>>> I'd be happy to help in understanding the code if need be. > Samples > >>>>>>>>>>>>> are > >>>>>>>>>>>>> available in TckBusiness, via the signBusiness and > verifyBusiness > >>>>>>>>>>>>> methods. > >>>>>>>>>>>>> These are used by the saveJoePublisherBusinessX509Signature > test, > >>>>>>>>>>>>> which > >>>>>>>>>>>>> is > >>>>>>>>>>>>> run from the UDDI_030_BusinessEntityIntegrationTest (method > is > >>>>>>>>>>>>> testJoePublisherBusinessEntitySignature). > >>>>>>>>>>>>> > >>>>>>>>>>>>> Keep in mind that all of this code is extremely sensitive to > the XML > >>>>>>>>>>>>> signature transformations used, as well as the serialization > methods > >>>>>>>>>>>>> used. > >>>>>>>>>>>>> The best documentation for it all is the XML Signature > standard and > >>>>>>>>>>>>> the > >>>>>>>>>>>>> JUDDI specification itself. > >>>>>>>>>>>>> > >>>>>>>>>>>>> Thanks, > >>>>>>>>>>>>> Jess > >>>>>>>>>>>>> > >>>>>>>>>>>>> > >>>>>>>>>>>>> > >>>>>>>>>>>>> On Sun, Mar 17, 2013 at 11:49 AM, Alex O'Ree < > spyhunte...@gmail.com> > >>>>>>>>>>>>> wrote: > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> So I'm looking at the following files > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > http://svn.apache.org/repos/asf/juddi/tags/juddi-3.1.4/uddi-tck-base/src/main/java/org/apache/juddi/v3/tck/TckSigningUtil.java > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > http://svn.apache.org/repos/asf/juddi/tags/juddi-3.1.4/juddi-core/src/main/java/org/apache/juddi/mapping/MappingApiToModel.java > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> with the overall goal of providing a digital signature type > of > >>>>>>>>>>>>>> capability from the browser to a publish/inquiry endpoint, > however > >>>>>>>>>>>>>> I'm > >>>>>>>>>>>>>> not really seeing anything to connect the dots. > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> Does anyone have a working example of a uddi client which > digitally > >>>>>>>>>>>>>> signs a uddi element using the juddi client api, then > posting it to > >>>>>>>>>>>>>> juddi? > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> Is there anything along the lines of validating the > signature? or > >>>>>>>>>>>>>> the > >>>>>>>>>>>>>> certificate for that matter? > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> It looks like the TckSiginingUtil could be refactored into > the > >>>>>>>>>>>>>> client > >>>>>>>>>>>>>> api or the core which would add the required functionality, > more or > >>>>>>>>>>>>>> less. Unfortunately, its not documented very well (at all). > I found > >>>>>>>>>>>>>> that it's used in > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > >>>>>>>>>>>>>> > \uddi-tck-base\src\main\java\org\apache\juddi\v3\tck\TckBusiness.java > >>>>>>>>>>>>>> but how it translates to a functional test isn't clear. > >>>>>> >