OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services



Similar documents
Digital Signing without the Headaches

Digital Signature Verification using Historic Data

Technical Guideline TR ecard-api-framework ecard-interface. Version 1.1.5

ETSI TS V1.1.1 ( ) Technical Specification

Exploring ADSS Server Signing Services

Long term electronic signatures or documents retention

ETSI TS V1.4.2 ( ) Technical Specification. Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES)

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA

ETSI TS V1.3.2 ( )

Web Services Trust and XML Security Standards

Digital Signature Service. e-contract.be BVBA 2 september 2015

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures

Digital Signature Web Service Interface

Trustis FPS PKI Glossary of Terms

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Server based signature service. Overview

CS 356 Lecture 28 Internet Authentication. Spring 2013

ETSI TS V1.1.1 ( ) Technical Specification

Signature policy for TUPAS Witnessed Signed Document

PKI: Public Key Infrastructure

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

OB10 - Digital Signing and Verification

ETSI TS V1.1.1 ( )

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Specifying the content and formal specifications of document formats for QES

BDOC FORMAT FOR DIGITAL SIGNATURES

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

e-szigno Digital Signature Application

A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security

WEB SERVICES SECURITY

Representation of E-documents in AIDA Project

Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)

ETSI TS V1.1.1 ( ) Technical Specification

XML Advanced Electronic Signatures (XAdES)

Multiple electronic signatures on multiple documents

Securing Adobe PDFs. Adobe - Certified Document Services Registration Authority (RA) Training. Enterprise Security. ID Verification Services

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

AlphaTrust PRONTO Enterprise Platform Product Overview

Making Digital Signatures Work across National Borders

White Paper. Digital signatures from the cloud Basics and Applications

Cartão de Cidadão: Autenticação de Papéis do Cidadão

Land Registry. Version /09/2009. Certificate Policy

CERTIFICATION PRACTICE STATEMENT UPDATE

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

secure2sign: Secure and Seamless Enterprise Signing for Word (including 2007).

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

SAFE Digital Signatures in PDF

Electronic Signature. István Zsolt BERTA Public Key Cryptographic Primi4ves

CoSign for 21CFR Part 11 Compliance

CoSign by ARX for PIV Cards

TechNote 0006: Digital Signatures in PDF/A-1

PKI - current and future

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

This Working Paper provides an introduction to the web services security standards.

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

Future directions of the AusCERT Certificate Service

Best prac*ces in Cer*fying and Signing PDFs

Java Security Web Services Security (Overview) Lecture 9

Public Key Infrastructure (PKI)

Security Digital Certificate Manager

Security Digital Certificate Manager

Concept of Electronic Approvals

European Federated Validation Service Study. Solution Profile Trustweaver on Demand

Websense Content Gateway HTTPS Configuration

e-filing Secure Web Service User Manual

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2

Key Management Interoperability Protocol (KMIP)

Vodafone Group CA Web Server Certificate Policy

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

ETSI TS V1.1.2 ( ) Technical Specification

Secure Envelope specification

Operating a CSP in Switzerland or Playing in the champions league of IT Security

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

SBClient SSL. Ehab AbuShmais

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

SSLPost Electronic Document Signing

Configuring Digital Certificates

DEPARTMENT OF DEFENSE ONLINE CERTIFICATE STATUS PROTOCOL RESPONDER INTEROPERABILITY MASTER TEST PLAN VERSION 1.0

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Version 2.4 of April 25, 2008

Transcription:

www.oasis-open.org OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services Juan Carlos Cruellas UPC Spain Nick Pope Thales esecurity (Co-Chairs Chairs DSS Technical Committee)

Contents Introduction Why DSS Outline features Advantages Set of specifications Use case example: EU invoicing Core Protocols Introduction Signing protocol Verifying protocol Profiling core Introduction Some relevant profiles Present and Future Questions and Answers

www.oasis-open.org Why DSS Avoid burden of deployment of signing on individual basis Shared server for generation and verification of digital signatures Support of signing as corporate function

Conventional Approach (1) Registration (2) Purchasing System (3) (5) (4) (4) Revocation Timestamp PKI Certificate Management (5) (2) Cert. Archiving Cert, CRL. Directory Deploy key to each user Handle Interface to all PKI functions Security depends on user CRL. (3)

DSS approach Internal user Authentication & authorisation Directory System PKI Certificate Management

DSS Sign Protocol (Signed document) DSS-Sign request (document) DSS-Sign response (Signed document) DSS Server Archive

DSS Signature Creation: Advantages Authentication of user separated from management of signature key. Controls on who may apply corporate signatures Controls on user access to own signing key Based on existing internal security controls using existing authentication and authorisation controls within normal work flow If user s authorisation is revoked, organisation can stop use of signature Immediate No need to publish external revocation No need for special device on user system Strict organisational controls can be applied to handling of signing key Improved security & reduced per user cost

DSS Verify Protocol (Signed document) DSS-Verify request (Signed document) Public Key Store / directory Archive

DSS Signature Verification: Advantages Verification complexities taken off user system Common verification policy can be directly applied Can maintain log of result of signature verification when first received for later re-checking

www.oasis-open.org DSS Features Supports : Creation of digital signatures Verification of signatures Creation / verification of time-stamps XML (Define in DSS) / Binary (RFC 3161) Generic Core Profiles for particular use cases

www.oasis-open.org DSS Features Support range of signature formats including: W3C XML Signatures CMS (RFC 3852) Signatures RFC 3161 XML time-stamps (defined in DSS) Advanced Electronic Signatures (ETSI TS 101903 and ETSI TS 101733) Range of Document / Signature structures Optional inputs / outputs for controlling specific features

www.oasis-open.org Set of specifications: Core protocol. Profiles of the core: XML time-stamping Entity seal Signature gateway Advanced / Long term Electronic Signatures (ETSI TS 101 733, TS 101 903, RFC 3126) Code Signing Electronic Post Mark

Use case: e-invoicing and European Value Added Tax System Chip Co Inv 27 100 + 15 VAT 3 15 TAXMAN 45 15-3 Casing Co Inv 27 20 + 3 VAT Phone Co Inv 27 300 + 45 VAT

EU VAT Harmonisation Directive Invoices sent by electronic means shall be accepted by Member States provided that the authenticity of the origin and integrity of the contents are guaranteed.. Recognised mechanisms: EDI Service Provider Advanced Electronic Signature X.509 based Digital Signature From company / company officer

Requirement for Storage of Signed Invoices Technical Requirements Information used to verify signature when stored Certificate path OCSPs / CRLs Time of verification Signature Time-stamp Means to assure validity of signature at signing time during lifetime of documents (e.g. 10 years) Ref: CWA 15579 ETSI TS 102 573

DSS Signature Creation applied to einvoicing einvoicing Application Local authentication & Access control Jo Inc 100 + 17.5 VAT DSS Signing Server

DSS Signature Verification applied to einvoicing einvoicing Application Jo Inc 100 + 17.5 VAT Certs, CRL / OCSP DSS Verification Server Audit log

Core Outline Basic XML Structures for: SignRequest SignResponse VerifyRequest VerifyResponse Common request / response basic structure Optional inputs / outputs to handle different ways of signing / verifying Range of ways of conveying document Transport: HTTP, SOAP SSL, Web Security Services

Base request and common controls Optional inputs (additional controls) For validation ID attrs. identification RequestBaseType 0..1 0..1 OptionalInputs InputDocuments Input documents for the request: - Several documents - Digests of documents - Data resulting from applying transformations to documents 1..* OptInputInstance ClaimedIdentity ServicePolicy Schemas AdditionalProfile Language Profiling management

Base response ResponseBaseType Result 0..1 ResultMajor ResultMinor URIs 0..1 OptionalOutputs 0..1 ResultMessage Optional outputs (any type) controled by optional inputs inrequest.

Signing Protocol: To-be-signed documents and data in request. SignRequest 0..1 0..1 OptionalInputs InputDocuments 0..* 0..* 0..* 0..* Document DocumentHash TransformedData Other InlineXML Base64XML EscapedXML Base64Data AttachementReference Extract with Canonical Exclusive XML data escaped as per XML recommendation Input documents (at least one child if present): - Several documents - Digests of documents - Data resulting from applying transformations to documents - Other SOAP 1.2 attachment feature

Signing Protocol: Additional controls in request. Selector for private key OptInputInstance KeySelector SignatureType AddTimeStamp IncludeObject SignedReferences SignaturePlacement XML Sig, CMS, Time-stamp,.. Requests signature and timestamp on it For XML enveloping signatures Further control: several ds:reference from one document For XML enveloped signatures

Core: Signing Protocol Features summary To-be-signed documents: Signature may be requested for: More than one document. Digests of documents (confidentiality issues). Data objects resulting from transformations of documents. Documents in several formats: base64- encoded binary, XML (escaped, base-64 encoded, inline), SOAP Attachment

Core: Signing Protocol Features summary Specific controls for signature generation. Client may: request a specific type of signature / time-stamp claim his own identity request signing with a specific private key request generation of a time-stamp on the generated signature request that the signature envelopes one or more signed documents.

Core: Signing Protocol Features summary Request the server generate several to-besigned data objects from one input document (using XPath transformations, for instance) and sign each one (one ds:reference per data object). Request to envelope the signature within a XML document.

Signining Protocol: Response SignResponse Result 0..1 0..1 OptionalOutputs SignatureObject 1..* OptOutputInstance 0..1 DocumentWithSignature For enveloped signature Schemas ds:signature One of: - RFC3161 time-stamp - XML time-stamp - Other type 0..1 0..1 0..1 TimeStamp Base64Signature SignaturePtr CMS Signature/time-stamp requested Only one element 0..1 Other Pointer to enveloped XML Sig

Core: Signing Protocol Response Relevant features: The response may contain one enveloping, one enveloped or one detached signature. The enveloped signature appears within the DocumentWithSignature element, and is pointed by SignaturePtr.

Verifying Protocol: Specific controls in request VerifyRequest 0..1 0..1 0..1 OptionalInputs InputDocuments SignatureObject 1..* OptInputInstance VerifyManifest UseVerificationTime ReturnProcessingDetails ReturnSigningTimeInfo ReturnSignerIdentity ReturnUpdatedSignature ReturnTransformedDocument Signature/time-stamp to be verified (enveloped, enveloping, detached) Signed documents must be sent to the server. ReturnTimestampedSignature

Core. Verifying Protocol. Features summary Signed documents: Enveloping documents: Directly incorporated with the enveloped signatures. Enveloped documents: Signature within SignatureObject with enveloped document.

Core: Verifying Protocol Features summary Detached documents: The server DOES NOT retrieve detached documents: must be sent in the request. Incorporated as InputDocuments each one including in one attribute the URI value present in the corresponding ds:signature s ds:reference, so that the server may link the signature with the signed detached document.

Core: Verifying Protocol Features summary Specific controls on verification process. The client may: request verification of ds:manifest. request the server to act as if the verification time is not the present one but another one request to return information on the signing time (good if there is any signature timestamp) request return of the signer identity

Core: Verifying Protocol Features summary request update of the signature (this means incorporation of verification material, timestamps on verification material, etc). This is related with re-verification of signatures. Alternatively DSS also supports audit log of verification material. request transformation of certain documents and return request generation of a time-stamp on the verified signature request details of the verification process

Core: Verifying Protocol Features summary If there are more than one signatures in one document, the server may verify all of them, but not possible to individually report each verification.

Verifying Protocol: Response VerifyResponse Result 0..1 OptionalOutputs 1..* OptOutputInstance VerifyManifestResult ProcessingDetails SigningTimeInfo SignerIdentity UpdatedSignature TransformedDocument TimestampedSignature DocumentWithSignature

DSS profiling Support for different scenarios and ways of signing/verifying. Profiles: Time-stamp: equivalent of RFC 3161 for XML. Entity-seal: generation/verification of a seal (time-stamped signature with information of identity of the requester: proxy signature). Advanced Electronic Signature. Supports lifecycle of long term electronic signatures

DSS profiling Signature Gateway: creation of signatures at a gateway, translating from an internal format to a standard form Code-signing. Support to signing of code authorized for distribution Asynchronous Processing. Supports deferred delivery of server responses

Types of profiles: DSS profiling Concrete profiles: may be directly instantiated (entity seal, time-stamp,..) Abstract profiles Can be used as building bock for concrete profile Can be used in conjunction with concrete profiles to modify operation E.g. entity seal working with the code-signing profile to allow deferred response. Profiles work jointly for satisfying specific requirements in the given scenarios.

Present Status Fully ratified as OASIS standard. A number of interoperability tests carried out within the DSS TC Several implementations

Example Implementations CATCERT implementation for public agencies in Catalonya, Spain ARX CoSign - digital signature appliance Thales SafeSign appliance (Full DSS support prospective) UPC Netherlands government PDF document signing proof of concept Open Source version http://sirius-sign.sourceforge.net/

DSS Future New DSS-X TC Digital Signature Services extended opening in 23 rd July. DSS-X TC will join OASIS IDTrust member section. Charter at: http://www.oasis-open.org/committees/dssx/charter.php Envisaged work: Development of new profiles. More interoperability testing Production of educational material Maintenance of the core

DSS Future Prospective profiles identified so far: Visible signatures PDF Signatures Profile for ebxml Profile for individual reports on every signature verified in multi-signature documents Profile for requesting signed verification responses "baseline" profiles. Profiles for basic functions in support of generation and verification of XML signatures, CMS signatures, XML time-stamps and RFC 3161 timestamps. Handling of signature & service policy Profile for supporting centralized encryption and decryption services

Thank you Questions? Further information: DSS published specifications http://www.oasis-open.org/committees/dss DSS-X Future activities http://www.oasis-open.org/committees/dss-x