1 Digital Signatures – A Global Challenge Joachim Lingner Software Engineer Sun Microsystems 1.

Slides:



Advertisements
Similar presentations
Tutorial 8: Developing an Excel Application
Advertisements

Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1 Shawlands Academy Higher Computing Software Development Unit.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Data File Access API : Under the Hood Simon Horwith CTO Etrilogy Ltd.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Why Java? A brief introduction to Java and its features Prepared by Mithat Konar.
Certificate revocation list
SE: CHAPTER 7 Writing The Program
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
The Software Development Process
PRIOR TO WEB SERVICES THE OTHER TECHNOLOGIES ARE:.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Plug-in Architectures Presented by Truc Nguyen. What’s a plug-in? “a type of program that tightly integrates with a larger application to add a special.
Module 8 Implementing Security Using Group Policy.
Appliance Management StratusLab Tutorial (Orsay, France) 28 November 2012.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Presented by : Piero Milani ( InfoCamere - Italy)Piero Milani InfoCamere - Italy VCD Signature & VCD Verification strategy as seen by InfoCamere ( WP1.
1 April 14, Starting New Open Source Software Projects William Cohen NCSU CSC 591W April 14, 2008.
DLSLUG Presentation: Firefox extensions. DLSLUG Presentation: Firefox extensions, Roger Trussell ● My address is
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
ClickOnce Deployment (One-click Deployment)
TAG Presentation 18th May 2004 Paul Butler
Creating Section 508 Compliant Documents & Presentations
Key management issues in PGP
Excel Tutorial 8 Developing an Excel Application
2.2 Internet Basics.
Internet Made Easy! Make sure all your information is always up to date and instantly available to all your clients.
Development Environment
Project Objectives Publish to a remote server
GUI Design and Coding PPT By :Dr. R. Mall.
CARA 3.10 Major New Features
TAG Presentation 18th May 2004 Paul Butler
StratusLab Tutorial (Bordeaux, France)
e-Health Platform End 2 End encryption
Configuration Management and Prince2
Inside Module 10 Editing TurboIMAGE Datasets Page
Metadata Editor Introduction
Instructor Materials Chapter 5: The Art of Ensuring Integrity
S/MIME T ANANDHAN.
OpenOffice. org Extensions Infrastructure What it is –. What it can –
IS3230 Access Security Unit 9 PKI and Encryption
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Top Reasons to Choose Angular. Angular is well known for developing robust and adaptable Single Page Applications (SPA). The Application structure is.
Nessus Vulnerability Scanning
Creating Section 508 Compliant Documents & Presentations
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
ELECTRONIC MAIL SECURITY
Microsoft Office Access 2003
ELECTRONIC MAIL SECURITY
csci5233 computer security & integrity (Chap. 4)
Digital Certificates and X.509
Creating Section 508 Compliant Documents & Presentations
Microsoft Excel 2007 – Level 2
Patents e-Commerce Update: Public and Private PAIR
Instructor Materials Chapter 5: The Art of Ensuring Integrity
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
Metadata The metadata contains
ILogic What’s New.
Patents e-Commerce Update: Public and Private PAIR
File System Management
Securing and Sharing a Presentation
Lecture 13 Teamwork Bryan Burlingame 1 May 2019.
Instructor Materials Chapter 5: Ensuring Integrity
ClickOnce Deployment (One-click Deployment)
Digital Signature Standard (DSS)
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

1 Digital Signatures – A Global Challenge Joachim Lingner Software Engineer Sun Microsystems 1

2 Content Actually not much Shortcomings of the current implementation Signature framework

3 XML Digital Signature in OOo Protects against Manipulation of the content ZIP File Signatures.xml File Entry 1 File Entry 2 File Entry 3

4 XML Digital Signature in OOo (contd.) Allows adding data, but not changing content ZIP File Signatures.xml File Entry 1 File Entry 2 File Entry 3 white space File Entry 4...

5 Alternative to XML DSig Signing the whole file, for example using CMS (Cryptographic Message Syntax) ZIP File Signatures.xml File Entry 1 File Entry 2 File Entry 3

6 Managing Certificates and Keys OOo uses different key stores (except on Windows). Selection of key stores is “incomprehensible” for users. > Using fixed order of products (Thunderbird, Firefox, etc.) > Only default profile can be used. Users may have different profiles. > Key store can be determined by an environment variable.

7 Managing Certificates and Keys (contd.) Users want a central place to manage all keys / certificates.

8 Maintaining the Code OOo uses an old version of 'XML Security Library', which cannot be updated easily. “Ancient” Mozilla libraries The implementation is difficult to understand / debug. The implementation makes use of XUnoTunnel. Therefore, UNO services cannot easily be exchanged.

9 Certificate Validation Validation results may differ on different platforms. > Windows and NSS API does not document exactly how validation is done. Certificate Revocation Lists (CRLs) are NOT required. Retrieval of CRLs limited (LDAP, etc.). Retrieval of intermediate certificates is not supported in old NSS library (via AIA extension).

10 What Are Signed Documents Good For The digital signature replaces a hand written signature in an electronic document. Broad acceptance will only be achieved, if > the signature conforms to legal regulations > the conformance is certified That's the “Global Challenge”.

11 Critical Issues for Germany No certification from Federal Network Agency for Electricity, Gas, Telecommunications, Postal Service and Railways (BNetzA). An expired certificate does not invalidate the signature necessarily. The user must be clear about what exactly is being signed. The dialog just refers to the 'content'.

12 Critical Issues for Germany (contnd.) Certificates must be used according to their purpose. OOo does not process the KeyUsage extension. SHA-1 is not regarded as secure for signing data. Documents need to be resigned before algorithms become weak. The revocation status of certificates must be checked.

13 Objectives for a Framework Extending OOo easily with new signature components (for example, for different countries) Fast and easy selection of the signing algorithm in the options dialog Replacing the current implementation

14 What Signatures Are There XML Digital Signature XML Advanced Electronic Signature (XAdES) CMS Advanced Electronic Signature (CAdES) other Signatures can be stored in different ways: > as file entries in the zip file (currently used) > as file entry in the zip file but signing the whole file > the signature file itself can contain the signed data

15 Selecting the Signature Type

16 Using Different Signature Types Adding a new signature may break an already existing signature. Different signatures may validate differently. For example, the file is signed with a CMS signature and then a XML signature is added to the file. Difficult user interface. Different validation results are difficult to convey to user. Therefore, only one signature type per document.

17 Menu Items Document and macro signatures entries

18 Menu Items (contd.) Other signature components may not support a separate macro signature, and need to “disable” the menu item. Or every signature component defines their own menu items

19 Menu Items (contnd.) New document: the menu items of the currently selected signature component are displayed. Loading a signed document: the menu items of the signature component that created the signature are displayed. Loading a document with an unknown signature: No signature related menu items are displayed. No additional signature can be added. Requires enhancements for handling of menus and tool bars.

20 Status Bar Signature components can provide their own icons and display them in the status bar. OOo can provide a set of standard icons. Requires a new public API.

21 Identifying the Signature Component Documents should contain a signature description for these reasons: OOo must recognize a signature even if the matching signature component is not installed. Then no other signature may be written. Only the right signature component produces the expected validation result. Only the right signature component can remove the signature properly. If there is no suitable signature component installed, then the user needs to be informed.

22 Unknown Signature Type ODF containing the signature and signature description

23 Unknown Signature Type (contd.) ODF file embedded in signature, no access to signature description

24 Problems solved? Easier to provide signature components which are adapted to local legal regulations. Easier for the user to chose a signature format. Other problems have been shifted to the developers of the signature components. > Writing, validation, key administration Maybe this framework is overkill and we should focus on one particular type of signature.

25 Joachim Lingner Further discussions on