
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k1MF2sPl045842; Wed, 22 Feb 2006 08:02:54 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k1MF2sSg045841; Wed, 22 Feb 2006 08:02:54 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from ns1.cpanel.btnaccess.com (ns1.cpanel.btnaccess.com [205.177.121.2]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k1MF2rR8045835 for <ietf-ltans@imc.org>; Wed, 22 Feb 2006 08:02:53 -0700 (MST) (envelope-from robholliday@isocore.com)
Message-Id: <200602221502.k1MF2rR8045835@balder-227.proper.com>
Received: from [65.213.193.135] (helo=ISODELL001) by ns1.cpanel.btnaccess.com with esmtp (Exim 4.52) id 1FBvVz-0007lj-7c for ietf-ltans@imc.org; Wed, 22 Feb 2006 10:02:51 -0500
From: "Robert Holliday" <robholliday@isocore.com>
To: <ietf-ltans@imc.org>
Subject: International Conference on Network Security 2006
Date: Wed, 22 Feb 2006 10:02:52 -0500
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01C63797.24DC13F0"
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
Thread-Index: AcY3wQ1oZSvucIsCSeOHG2kehror5g==
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ns1.cpanel.btnaccess.com
X-AntiAbuse: Original Domain - imc.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - isocore.com
X-Source: 
X-Source-Args: 
X-Source-Dir: 
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

This is a multi-part message in MIME format.

------=_NextPart_000_0008_01C63797.24DC13F0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

 

Registration Open!!!

 

Reston Virginia, April 17-19

Early Registration Benefits Now Available

 

The conference offers cutting edge discussion and presentations on the
contemporary issues in network security and critical information
infrastructure.  

 

Technical Program:  <http://www.isocore.com/networksecurity2006/program.htm>
http://www.isocore.com/networksecurity2006/program.htm 

 

Discounts still available for early registration.

 

Registration:  <http://www.isocore.com/networksecurity2006/onlineregis.htm>
http://www.isocore.com/networksecurity2006/onlineregis.htm

 

Hotel space is limited but currently available and reservation can be made
on-line.

 

Hotel Reservations:  <http://www.isocore.com/networksecurity2006/hotel.htm>
http://www.isocore.com/networksecurity2006/hotel.htm

 

To obtain special rates for student or group please contact Robert Holliday
at rholliday@isocore.com.

 

 <http://www.networksecurity2006.com/> www.networksecurity2006.com

 

 

 


------=_NextPart_000_0008_01C63797.24DC13F0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><a name=3D"OLE_LINK2"></a><a =
name=3D"OLE_LINK1"><font size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></a></p>=


<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>Registration =
Open!!!</span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>Reston Virginia, April =
17-19</span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>Early Registration Benefits =
Now
Available</span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>The conference offers cutting edge discussion and
presentations on the contemporary issues in network security and =
critical
information infrastructure.&nbsp; </span></font></p>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>&nbsp;</span></font></b></p>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Technical =
Program:</span></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> </span></font><a
href=3D"http://www.isocore.com/networksecurity2006/program.htm"><font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>http://www.isocore.com/netwo=
rksecurity2006/program.htm</span></font></a><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> </span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Discounts still available for early =
registration.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Registration:</span></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> </span></font><a
href=3D"http://www.isocore.com/networksecurity2006/onlineregis.htm"><font=
 size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>http://www.isocore.com/netwo=
rksecurity2006/onlineregis.htm</span></font></a></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hotel space is limited but currently available and
reservation can be made on-line.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Hotel =
Reservations:</span></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> </span></font><a
href=3D"http://www.isocore.com/networksecurity2006/hotel.htm"><font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>http://www.isocore.com/netwo=
rksecurity2006/hotel.htm</span></font></a></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>To obtain special rates for student or group please =
contact
Robert Holliday at rholliday@isocore.com.</span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><a =
href=3D"http://www.networksecurity2006.com/"><font size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>www.networksecurity2006.com<=
/span></font></a></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:10.0pt;font-family:"Courier =
New"'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0008_01C63797.24DC13F0--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k1MChhJU028143; Wed, 22 Feb 2006 05:43:43 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k1MChhJI028142; Wed, 22 Feb 2006 05:43:43 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k1MChgDh028123 for <ietf-ltans@imc.org>; Wed, 22 Feb 2006 05:43:43 -0700 (MST) (envelope-from Andreas.U.Schmidt@sit.fraunhofer.de)
Received: from [141.12.87.229] (sitp394.sit.fraunhofer.de [141.12.69.140]) (authenticated bits=0) by mailext.sit.fraunhofer.de (8.13.1/8.13.1/9.9.9) with ESMTP id k1MChOAr007558 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 22 Feb 2006 13:43:25 +0100
Message-ID: <43FC5CAE.3070405@sit.fraunhofer.de>
Date: Wed, 22 Feb 2006 13:44:30 +0100
From: "Andreas U. Schmidt" <Andreas.U.Schmidt@sit.fraunhofer.de>
Reply-To: Andreas.U.Schmidt@sit.fraunhofer.de
User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-ltans@imc.org
Subject: Call for papers, Workshop "Long-term Security" at ETRICS 2006
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: by amavisd-new
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

	Call for Papers for the Workshop "Long-term Security"
	
	Co-located with the International Conference on 
	Emerging Trends in Information and Communication Security (ETRICS'06)
	June 6-9, 2006, Freiburg, Germany
	
	http://www.etrics.org/workshops
	
	Concerns about the long-term security of digital data and communication are growing for many applications, such as archiving, notarial acts, secure transmission of genome data, and many workflows in the banking and financial industries, e-health, and e-government. Security goals, such as availability, authenticity, integrity, and confidentiality of documents and communication contents are in danger when viewed from a long-term perspective. 
	
	In contrast to paper documents, the probative force of electronically signed documents can decrease over time due to advances in cryptographic research, the increasing computational power to break keys and the possible realization of the quantum computer. These advances might also allow long-term and/or future attacks on encrypted communication over public networks, thus threatening the confidentiality of the contents. Additionally, legal regulations often demand time spans for document preservation which are well beyond the expected lifetime of common data formats. The transformation into current formats imposes new challenges, especially for signed documents. 
	
	This workshop aims at the discussion of recent advances in organizational and technical means providing long-term security. Theoretical work, prototypes and experimental studies are equally welcome. 
	
	Topics of interest include but are not limited to:
	

	*	Security goals, requirements and legal aspects under a long-term perspective 
	*	Organizational and technical means of long-term security 
	*	Long-term cryptographic mechanisms 
	*	Operations such as conversions to ensure the long-term-availability of data 


	Important Dates:
	

	*	April 15, 2006: Abstract submission (send 2 pages to kreutzer@dzi.tu-darmstadt.de) 
	*	April 28, 2006: Final paper submission 
	*	May 1, 2006: Notification of acceptance for the workshop 


	Workshop Chairs:
	

	*	Dr. Andreas. U. Schmidt, Fraunhofer SIT, Germany 
	*	Michael Kreutzer, Darmstadt Centre for IT Security, Germany 


	Program Committee: 
	

	*	Harald Baier, FH Bingen, Germany 
	*	Martin Döring, Cryptography and Computer Algebra, TU Darmstadt, Germany 
	*	Maximillian Dornseif, Dependable Distributed Systems, University of Mannheim, Germany 
	*	Manuel Hartl, Flexsecure GmbH, Eberstadt, Germany 
	*	Martin Kähmer, Univ. of Freiburg, Germany 
	*	Ulrich Pinsdorf, Fraunhofer IGD, Germany 
	*	Kai Rannenberg, Univ. of Frankfurt, Germany 
	*	Jörg Rocker, Security Management, Postbank Systems AG, Germany 
	*	Axel Sikora, Univ. of Applied Sciences Lörrach, Germany 
	*	Daniel Wilke, Project group constitution-compatible technology development, Univ. Kassel, Germany 
	*	Petra Wohlmacher, Federal Network Agency, Mainz, Germany 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1GGxgE8074913; Thu, 16 Feb 2006 08:59:42 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1GGxg81074912; Thu, 16 Feb 2006 08:59:42 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1GGxgHS074905 for <ietf-ltans@imc.org>; Thu, 16 Feb 2006 08:59:42 -0800 (PST) (envelope-from chokhani@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C6331B.4B4EDCF5"
Subject: Comments draft-ietf-ltans-ers-05
Date: Thu, 16 Feb 2006 09:06:14 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C8790147D52F@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Comments draft-ietf-ltans-ers-05
thread-index: AcYzGl22DMTwlZp3SHm//Bj2ISrSIw==
From: "Santosh Chokhani" <chokhani@orionsec.com>
To: <ietf-ltans@imc.org>
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

This is a multi-part message in MIME format.

------_=_NextPart_001_01C6331B.4B4EDCF5
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

1.       We should state in the security considerations section that the
long term security of encryption scheme has not been analyzed in terms
of how it can be used to create collisions.  Actually, a better
understanding of Section 5 is required to make a final determination in
this area.

=20

2.        It should also point out that the encryption scheme is not
renewable.

=20

3.       Section 4.1, Is there a hash tree aside from or other than the
reduced hash tree?

=20

4.       Section 4.2 contradicts Section 3 by saying that "initial time
stamp is obtained for each object".  I thought the time stamp is
obtained for a reduced hash tree.

=20

5.       Section 4.3, all three verification steps seem to be missing
generation of root hash and using that to verify the time stamp.

=20

6.       Section 5.1 ASN.1 seems to be incomplete.

=20

7.       Section 5 is confusing enough that an example in Appendix will
help

=20

8.       Section 5.1 is unclear on what is in the archive record in
terms of private and secret keys.

a)    The section says that RSA key transfer is used, but then describes
the symmetric encryption also.

b)    The ASN.1 seems to imply that the private key or the symmetric key
is also archived.  That does not seem to provide any confidentiality to
the archived data.  In that case, why not archive the plaintext data.

Santosh Chokhani=20
Orion Security Solutions, Inc.=20
1489 Chain Bridge Road, Suite 300=20
McLean, Virginia 22101=20
(703) 917-0060  Ext. 35 (voice)=20
(703) 917-0260 (Fax)=20
chokhani@orionsec.com=20
Visit our Web site=20
http://www.orionsec.com <http://www.orionsec.com> =20

=20


------_=_NextPart_001_01C6331B.4B4EDCF5
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PostalCode"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"Street"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"address"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:Arial;}
h1
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:.3in;
	text-indent:-.3in;
	page-break-after:avoid;
	mso-list:l0 level1 lfo4;
	font-size:12.0pt;
	font-family:Arial;
	font-weight:bold;}
h2
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:.4in;
	text-indent:-.4in;
	page-break-after:avoid;
	mso-list:l0 level2 lfo4;
	font-size:11.0pt;
	font-family:Arial;
	font-weight:bold;}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
p.StyleCentered, li.StyleCentered, div.StyleCentered
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:Arial;}
span.EmailStyle19
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:209154939;
	mso-list-template-ids:2064295352;}
@list l0:level1
	{mso-level-style-link:"Heading 1";
	mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l0:level2
	{mso-level-style-link:"Heading 2";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:.4in;
	mso-level-number-position:left;
	margin-left:.4in;
	text-indent:-.4in;}
@list l0:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l0:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.6in;
	text-indent:-.6in;}
@list l0:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:.7in;
	mso-level-number-position:left;
	margin-left:.7in;
	text-indent:-.7in;}
@list l0:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l0:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l0:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l0:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
@list l1
	{mso-list-id:412944158;
	mso-list-type:hybrid;
	mso-list-template-ids:263734264 67698703 -1614262738 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:.25in;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%2\)";
	mso-level-tab-stop:.95in;
	mso-level-number-position:left;
	margin-left:.95in;
	text-indent:-.2in;}
@list l1:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2
	{mso-list-id:1216352322;
	mso-list-template-ids:-482153376;}
@list l2:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l2:level2
	{mso-level-text:"%1\.%2";
	mso-level-tab-stop:.4in;
	mso-level-number-position:left;
	margin-left:.4in;
	text-indent:-.4in;}
@list l2:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l2:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.6in;
	text-indent:-.6in;}
@list l2:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:.7in;
	mso-level-number-position:left;
	margin-left:.7in;
	text-indent:-.7in;}
@list l2:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l2:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l2:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l2:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
@list l3
	{mso-list-id:2136213924;
	mso-list-template-ids:-797130388;}
@list l3:level1
	{mso-level-tab-stop:.25in;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l3:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>1.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>We should state in the security =
considerations section
that the long term security of encryption scheme has not been analyzed =
in terms
of how it can be used to create collisions. &nbsp;Actually, a better
understanding of Section 5 is required to make a final determination in =
this
area.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>2.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>&nbsp;It should also point out that the =
encryption
scheme is not renewable.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>3.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>Section 4.1, Is there a hash tree aside from =
or other
than the reduced hash tree?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>4.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>Section 4.2 contradicts Section 3 by saying =
that
&#8220;initial time stamp is obtained for each object&#8221;.&nbsp; I =
thought
the time stamp is obtained for a reduced hash =
tree.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>5.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>Section 4.3, all three verification steps =
seem to be
missing generation of root hash and using that to verify the time =
stamp.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>6.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>Section 5.1 ASN.1 seems to be =
incomplete.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>7.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>Section 5 is confusing enough that an example =
in
Appendix will help<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l1 level1 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>8.<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>Section 5.1 is unclear on what is in the =
archive
record in terms of private and secret keys.<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.95in;text-indent:-.2in;mso-list:l1 level2 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>a)<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>The section says that RSA key transfer is =
used, but
then describes the symmetric encryption =
also.<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.95in;text-indent:-.2in;mso-list:l1 level2 =
lfo6'><![if !supportLists]><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt'><span =
style=3D'mso-list:Ignore'>b)<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2><span
style=3D'font-size:10.0pt'>The ASN.1 seems to imply that the private key =
or the symmetric
key is also archived. &nbsp;That does not seem to provide any =
confidentiality
to the archived data. &nbsp;In that case, why not archive the plaintext =
data.<o:p></o:p></span></font></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Santosh
Chokhani</span></font> <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Orion
Security Solutions, Inc.</span></font> <br>
<st1:address w:st=3D"on"><st1:Street w:st=3D"on"><font size=3D2 =
face=3DArial><span
  style=3D'font-size:10.0pt;font-family:Arial'>1489 Chain Bridge Road, =
Suite 300</span></font></st1:Street>
 <br>
<st1:City w:st=3D"on"><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
  font-family:Arial'>McLean</span></font></st1:City><font size=3D2 =
face=3DArial><span
 style=3D'font-size:10.0pt;font-family:Arial'>, <st1:State =
w:st=3D"on">Virginia</st1:State>
 <st1:PostalCode =
w:st=3D"on">22101</st1:PostalCode></span></font></st1:address> <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>(703)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>917-0060</span></font>&nbsp;=
<font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> <font
color=3Dred><span style=3D'color:red'>Ext. =
35</span></font></span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>(voice)</span></font>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>(703)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>917-0260
(Fax)</span></font> <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>chokhani@orionsec.com</span>=
</font>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Visit
our Web site</span></font> <br>
<a href=3D"http://www.orionsec.com"><font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>http://www.orionsec.com</spa=
n></font></a>
<o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>

------_=_NextPart_001_01C6331B.4B4EDCF5--



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1GFGRXx063371; Thu, 16 Feb 2006 07:16:27 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1GFGRMg063369; Thu, 16 Feb 2006 07:16:27 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1GFGQxc063356 for <ietf-ltans@imc.org>; Thu, 16 Feb 2006 07:16:26 -0800 (PST) (envelope-from cwallace@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: Jabber
Date: Thu, 16 Feb 2006 07:22:58 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C8790147D37A@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Jabber
thread-index: AcYzC/D2yYubyuvTTtClFvvP894kXQ==
From: "Carl Wallace" <cwallace@orionsec.com>
To: <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k1GFGQxc063358
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Folks,

The LTANS WG will be meeting next month in Dallas.  The draft IETF
agenda with the meeting date should be posted tomorrow.  I'll post a
draft meeting agenda by the end of the month.  In order to support
remote participation and speed WG progress, we really need a Jabber
scribe for this meeting.  Please let me know if you can fulfill this
role, or know someone who could.  Thanks.

Carl



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1FCPuS0043692; Wed, 15 Feb 2006 04:25:56 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1FCPuUT043691; Wed, 15 Feb 2006 04:25:56 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1FCPtJ4043684 for <ietf-ltans@imc.org>; Wed, 15 Feb 2006 04:25:55 -0800 (PST) (envelope-from cwallace@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: 65th IETF LTANS agenda slots
Date: Wed, 15 Feb 2006 04:32:13 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C879014218FA@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: 65th IETF LTANS agenda slots
Thread-Index: AcYyKcMRr6kkbQMoQ02MlK8AUhwJTw==
From: "Carl Wallace" <cwallace@orionsec.com>
To: <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k1FCPtJ4043686
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Folks,

If anyone would like time on the agenda during the LTANS meeting in
Dallas, please send a note to me and Tobias.  We'll post a draft agenda
later this month.

Carl



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DF7XEC042701; Mon, 13 Feb 2006 07:07:33 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1DF7Xjm042700; Mon, 13 Feb 2006 07:07:33 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from advantage-security.com ([201.148.139.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DF7Wi5042694 for <ietf-ltans@imc.org>; Mon, 13 Feb 2006 07:07:32 -0800 (PST) (envelope-from gwerner@advantage-security.com)
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Subject: RE: comments on draft-ietf-ltans-pki-notareqs-03.txt
Date: Mon, 13 Feb 2006 09:07:21 -0600
Message-ID: <1815FE0A4A30A44BA2F9E367E1B00AB130A46D@corporativo.production.local>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: comments on draft-ietf-ltans-pki-notareqs-03.txt
Thread-Index: AcYwc2pKqRmA8TawT6qt12ZrqPFhkAAOwv9w
From: "Greg Werner" <gwerner@advantage-security.com>
To: <Andreas.U.Schmidt@sit.fraunhofer.de>, <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k1DF7Wi5042695
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Yes I believe it would be worthwhile, BBVA Mexico for instance has stated that they would rather spend more to achieve more *trust* regarding their archived datum. They could, for example, set up an nCipher appliance to provide the time stamps on a massive scale. This would be cheaper for them and probably provide them with faster responses since the TSA would be hosted on the local network. However this is not a legal and therefore *trusted* solution for them.

How is a total system consisting of more trusted components more difficult to asses for security? 

Thanks.
Greg

-----Mensaje original-----
De: Andreas U. Schmidt [mailto:Andreas.U.Schmidt@sit.fraunhofer.de] 
Enviado el: lunes, 13 de febrero de 2006 2:00
Para: ietf-ltans@imc.org
Asunto: Re: comments on draft-ietf-ltans-pki-notareqs-03.txt

The rationale was that *trust* comes always at a cost, e.g.,
external timestamping services are expensive not due to technical
reasons but rather since their certified trustworthiness and accuracy
comes at a cost to the clientele. That discriminates the use of trusted
service providers in a general way from outsourcing. Moreover,
a total system consisting of more trusted components is more
difficult to assess for security, which entails further cost.
Performance and scalability might indeed not be such a problem.
Is an explanation along the mentioned lines desirable?

AUS

Greg Werner wrote:

>Regarding:
>
>6.  Operational Considerations
>
>   Data validation and certification services may have strong
>   performance and scalability requirements.  A certification service
>   must be able to work efficiently even for large amounts of data
>   objects and requests.
>
>   In order to limit expenses and to achieve high performance, the
>   involvement of other trusted third parties should be minimized.
>
>I´m not sure I understand the second paragraph. Could someone please explain, it sounds as if the recommendation is to "limit expenses" however some companies may which to pay more for certain services to circumvent some possible risks (whatever those may be).
>
>It sounds like the recommendation is out of scope because this is a cost/benefit and ROI analysis that each company should do.
>
>Greg
>
>
>
>  
>



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DCuSdF031977; Mon, 13 Feb 2006 04:56:28 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1DCuSHe031976; Mon, 13 Feb 2006 04:56:28 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DCuQtB031966 for <ietf-ltans@imc.org>; Mon, 13 Feb 2006 04:56:27 -0800 (PST) (envelope-from thomas.kunz@sit.fraunhofer.de)
Received: from [141.12.87.208] (sitp230.sit.fraunhofer.de [141.12.68.230]) by mailext.sit.fraunhofer.de (8.13.1/8.13.1/9.9.9) with ESMTP id k1DCuLA0011832; Mon, 13 Feb 2006 13:56:21 +0100
Message-ID: <43F081DE.2010702@sit.fraunhofer.de>
Date: Mon, 13 Feb 2006 13:55:58 +0100
From: Thomas Kunz <thomas.kunz@sit.fraunhofer.de>
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Adrian Frei <frr@zhwin.ch>
CC: Tilo Kienitz <tk-tlslist@seccommerce.de>, ietf-ltans@imc.org
Subject: Re: LTANS: Examples of ERS data - cross checking of implementations
References: <55FEC03AF31CBE458B6B455F5214CAC74342CA@langouste.zhwin.ch>	 <43F058D0.5030209@seccommerce.de>  <43F063BF.6060207@sit.fraunhofer.de> <1139834127.9584.40.camel@localhost.localdomain>
In-Reply-To: <1139834127.9584.40.camel@localhost.localdomain>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: by amavisd-new
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Adrian Frei wrote:
> Thomas Kunz wrote:
> 
>>Tilo Kienitz wrote:
>>
>>>Hello,
>>>
>>>Frei Adrian (frr) wrote:
>>>
>>>
>>>>Hmm, I think you misunderstood the generation of the reduced hash tree
>>>>(I-D 3.2). The five lists in IXOS' hash tree are not five data object
>>>>groups; they are five levels of the hash tree. The tree looks like 
>>>
>>> > this:
>>>
>>>
>>>>                    ROOT
>>>>                      |                                      \   \
>>>>                    YYYY                                   f79a 0000
>>>>                      |                            \   \    /|\
>>>>                    YYYY                          c414 3413 
>>>>                      |                    \   \   /|\ /|\
>>>>                    YYYY                 cf18 6ba0
>>>>       /              |             \     /|\ /|\
>>>>     YYYY (c4a8)    b837           46d8
>>>>  /    |   \     /    |   \     /    |   \
>>>>51b1 5bd0 60bb XXXX XXXX XXXX XXXX XXXX XXXX
>>>>data obj grp 1 data obj grp 2 data obj grp 3
>>>
>>>
>>>Thank you for the explanation. If it is really meant to encode this
>>>tree in the way the Ixos-example dit it, then how would it be possible
>>>to encode the tree if I wanted to include the complete "data obj grp 2"
>>>too? In the simple case that I only want to proove that a certain,
>>>single data object exists in the tree, only a single data object group
>>>has to be included in the reduced hash tree and the Ixos-encoding works
>>>fine. But let "data obj grp 1" contain the hash over the signature of
>>>a document and "data obj grp 2" the hash over the OCSP response for the
>>>certificate of the person who signed the document. Then I would like
>>>to have both hashes in the same reduced hash tree. Of course I could
>>>create two independent evidence records where each contains the reduced
>>>hash tree for one of the hashes. But it would be good to have every-
>>>thing relating to one document (sig hash and OCSP response hash) in the
>>>same evidence record.
>>>
>>
>>You have always different evidence records for every data object group 
>>in the hash tree. If you would like to have the hash over the signature 
>>and the hash over the ocsp response in the same reduced hash tree, you 
>>should build a data object group containing these two hashes. In the 
>>example above, "data obj grp 1" consists of three (data object) hashes, 
>>but a data object group can be of arbitrary size, independent of having 
>>a binary tree, a ternary tree or whatever tree.
> 
> 
> Ok, sorry, actually the three leafs in the IXOS tree are all single
> object groups with only a single object, which means the text in my
> diagram is wrong. However, it could have been otherwise.
> 
The text in your diagram is not necessarily wrong. As I pointed out in 
another thread in this mailing list, if you have a ternary tree and the 
first list of hash values in the reduced hashtree contains three hashes, 
you can't unambiguously detemine if you have a object group containing 
only one data object hash (and the other two hashes a simply siblings) 
or a data object group containing three data object hashes (the same 
e.g. in the case of a binary tree and two hash values in the first list).
Of course, since IXOS provided only one document together with the 
evidence record, we can assume that the group consists only of one 
document hash.

Regards,
Thomas




Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DCZbHU031103; Mon, 13 Feb 2006 04:35:37 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1DCZbJW031102; Mon, 13 Feb 2006 04:35:37 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mx2.zhwin.ch (mx2.zhwin.ch [160.85.104.51]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DCZaP9031095 for <ietf-ltans@imc.org>; Mon, 13 Feb 2006 04:35:36 -0800 (PST) (envelope-from frr@zhwin.ch)
Received: from orwell.zhwin.ch ([160.85.104.31]) by mx2.zhwin.ch with esmtp (Exim 4.54) id 1F8cvS-00031m-IJ; Mon, 13 Feb 2006 13:35:30 +0100
Received: from dove.zhwin.ch (Not Verified[160.85.196.13]) by orwell.zhwin.ch with NetIQ MailMarshal 6.0 Service Pack 1a (v6,0,3,33) id <B43f07ceb0002>; Mon, 13 Feb 2006 13:34:51 +0100
Received: from langouste.zhwin.ch ([160.85.196.12]) by dove.zhwin.ch with Microsoft SMTPSVC(6.0.3790.1830); Mon, 13 Feb 2006 13:35:30 +0100
Received: from 160.85.182.240 ([160.85.182.240]) by langouste.zhwin.ch ([160.85.196.12]) via Exchange Front-End Server mail.zhwin.ch ([160.85.196.13]) with Microsoft Exchange Server HTTP-DAV ; Mon, 13 Feb 2006 12:35:29 +0000
Received: from DSKT6049 by mail.zhwin.ch; 13 Feb 2006 13:35:27 +0100
Subject: Re: LTANS: Examples of ERS data - cross checking of implementations
From: Adrian Frei <frr@zhwin.ch>
To: Thomas Kunz <thomas.kunz@sit.fraunhofer.de>
Cc: Tilo Kienitz <tk-tlslist@seccommerce.de>, ietf-ltans@imc.org
In-Reply-To: <43F063BF.6060207@sit.fraunhofer.de>
References: <55FEC03AF31CBE458B6B455F5214CAC74342CA@langouste.zhwin.ch> <43F058D0.5030209@seccommerce.de>  <43F063BF.6060207@sit.fraunhofer.de>
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Date: Mon, 13 Feb 2006 13:35:27 +0100
Message-Id: <1139834127.9584.40.camel@localhost.localdomain>
Mime-Version: 1.0
X-Mailer: Evolution 2.4.1 
X-OriginalArrivalTime: 13 Feb 2006 12:35:30.0330 (UTC) FILETIME=[F9A7EFA0:01C63099]
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Thomas Kunz wrote:
> Tilo Kienitz wrote:
> > 
> > Hello,
> > 
> > Frei Adrian (frr) wrote:
> > 
> >> Hmm, I think you misunderstood the generation of the reduced hash tree
> >> (I-D 3.2). The five lists in IXOS' hash tree are not five data object
> >> groups; they are five levels of the hash tree. The tree looks like 
> > 
> >  > this:
> > 
> >>
> >>                     ROOT
> >>                       |                                      \   \
> >>                     YYYY                                   f79a 0000
> >>                       |                            \   \    /|\
> >>                     YYYY                          c414 3413 
> >>                       |                    \   \   /|\ /|\
> >>                     YYYY                 cf18 6ba0
> >>        /              |             \     /|\ /|\
> >>      YYYY (c4a8)    b837           46d8
> >>   /    |   \     /    |   \     /    |   \
> >> 51b1 5bd0 60bb XXXX XXXX XXXX XXXX XXXX XXXX
> >> data obj grp 1 data obj grp 2 data obj grp 3
> > 
> > 
> > Thank you for the explanation. If it is really meant to encode this
> > tree in the way the Ixos-example dit it, then how would it be possible
> > to encode the tree if I wanted to include the complete "data obj grp 2"
> > too? In the simple case that I only want to proove that a certain,
> > single data object exists in the tree, only a single data object group
> > has to be included in the reduced hash tree and the Ixos-encoding works
> > fine. But let "data obj grp 1" contain the hash over the signature of
> > a document and "data obj grp 2" the hash over the OCSP response for the
> > certificate of the person who signed the document. Then I would like
> > to have both hashes in the same reduced hash tree. Of course I could
> > create two independent evidence records where each contains the reduced
> > hash tree for one of the hashes. But it would be good to have every-
> > thing relating to one document (sig hash and OCSP response hash) in the
> > same evidence record.
> > 
> You have always different evidence records for every data object group 
> in the hash tree. If you would like to have the hash over the signature 
> and the hash over the ocsp response in the same reduced hash tree, you 
> should build a data object group containing these two hashes. In the 
> example above, "data obj grp 1" consists of three (data object) hashes, 
> but a data object group can be of arbitrary size, independent of having 
> a binary tree, a ternary tree or whatever tree.

Ok, sorry, actually the three leafs in the IXOS tree are all single
object groups with only a single object, which means the text in my
diagram is wrong. However, it could have been otherwise.

Tilo Kienitz wrote:
>>> Why is the last hash value 00...00? A hash which just happens to be
>>> all zeros by coincidence? Or does it have a special meaning?
> 
>> That's exactly because of 3.2.4. Since IXOS' tree contained something
>> between 81 and 162 documents they had to include an additional (dummy)
>> hash value (0000) to the last level of the tree to get a "complete"
>> ternary hash tree.
> 
> Why is it necessary to have a complete ternary hash tree? The hash
> computation would work well without the dummy.
> 

Hmm, I think you are right, but possibly it was just the easiest way to
generate a complete ternary hash tree and then reduce it. My
implementation does also generate complete and full balanced binary
trees just to make things easier.

Adrian


Content Security by MailMarshal



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DAlvoA021253; Mon, 13 Feb 2006 02:47:57 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1DAlvSd021252; Mon, 13 Feb 2006 02:47:57 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DAluL7021215 for <ietf-ltans@imc.org>; Mon, 13 Feb 2006 02:47:56 -0800 (PST) (envelope-from thomas.kunz@sit.fraunhofer.de)
Received: from [141.12.87.208] (sitp230.sit.fraunhofer.de [141.12.68.230]) by mailext.sit.fraunhofer.de (8.13.1/8.13.1/9.9.9) with ESMTP id k1DAlnF1012751; Mon, 13 Feb 2006 11:47:49 +0100
Message-ID: <43F063BF.6060207@sit.fraunhofer.de>
Date: Mon, 13 Feb 2006 11:47:27 +0100
From: Thomas Kunz <thomas.kunz@sit.fraunhofer.de>
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Tilo Kienitz <tk-tlslist@seccommerce.de>
CC: "Frei Adrian (frr)" <frr@zhwin.ch>, ietf-ltans@imc.org
Subject: Re: LTANS: Examples of ERS data - cross checking of implementations
References: <55FEC03AF31CBE458B6B455F5214CAC74342CA@langouste.zhwin.ch> <43F058D0.5030209@seccommerce.de>
In-Reply-To: <43F058D0.5030209@seccommerce.de>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: by amavisd-new
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hello,

Tilo Kienitz wrote:
> 
> Hello,
> 
> Frei Adrian (frr) wrote:
> 
>> Hmm, I think you misunderstood the generation of the reduced hash tree
>> (I-D 3.2). The five lists in IXOS' hash tree are not five data object
>> groups; they are five levels of the hash tree. The tree looks like 
> 
>  > this:
> 
>>
>>                     ROOT
>>                       |                                      \   \
>>                     YYYY                                   f79a 0000
>>                       |                            \   \    /|\
>>                     YYYY                          c414 3413 
>>                       |                    \   \   /|\ /|\
>>                     YYYY                 cf18 6ba0
>>        /              |             \     /|\ /|\
>>      YYYY (c4a8)    b837           46d8
>>   /    |   \     /    |   \     /    |   \
>> 51b1 5bd0 60bb XXXX XXXX XXXX XXXX XXXX XXXX
>> data obj grp 1 data obj grp 2 data obj grp 3
> 
> 
> Thank you for the explanation. If it is really meant to encode this
> tree in the way the Ixos-example dit it, then how would it be possible
> to encode the tree if I wanted to include the complete "data obj grp 2"
> too? In the simple case that I only want to proove that a certain,
> single data object exists in the tree, only a single data object group
> has to be included in the reduced hash tree and the Ixos-encoding works
> fine. But let "data obj grp 1" contain the hash over the signature of
> a document and "data obj grp 2" the hash over the OCSP response for the
> certificate of the person who signed the document. Then I would like
> to have both hashes in the same reduced hash tree. Of course I could
> create two independent evidence records where each contains the reduced
> hash tree for one of the hashes. But it would be good to have every-
> thing relating to one document (sig hash and OCSP response hash) in the
> same evidence record.
> 
You have always different evidence records for every data object group 
in the hash tree. If you would like to have the hash over the signature 
and the hash over the ocsp response in the same reduced hash tree, you 
should build a data object group containing these two hashes. In the 
example above, "data obj grp 1" consists of three (data object) hashes, 
but a data object group can be of arbitrary size, independent of having 
a binary tree, a ternary tree or whatever tree.



> 
>>> Why is the last hash value 00...00? A hash which just happens to be
>>> all zeros by coincidence? Or does it have a special meaning?
> 
>  >
> 
>> That's exactly because of 3.2.4. Since IXOS' tree contained something
>> between 81 and 162 documents they had to include an additional (dummy)
>> hash value (0000) to the last level of the tree to get a "complete"
>> ternary hash tree.
> 
> 
> Why is it necessary to have a complete ternary hash tree? The hash
> computation would work well without the dummy.
> 
> Regards
> Tilo
> 
> 
Regards,
Thomas



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DA1ANk015702; Mon, 13 Feb 2006 02:01:10 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1DA1AZS015701; Mon, 13 Feb 2006 02:01:10 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mail.seccommerce.de (mail.seccommerce.de [62.109.87.71]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1DA17Gq015694 for <ietf-ltans@imc.org>; Mon, 13 Feb 2006 02:01:08 -0800 (PST) (envelope-from tk-tlslist@seccommerce.de)
Received: (qmail 19897 invoked from network); 13 Feb 2006 10:03:12 -0000
Received: from unknown (HELO ?10.1.0.170?) (10.1.0.170) by 0 with RC4-MD5 encrypted SMTP; 13 Feb 2006 10:03:12 -0000
Message-ID: <43F058D0.5030209@seccommerce.de>
Date: Mon, 13 Feb 2006 11:00:48 +0100
From: Tilo Kienitz <tk-tlslist@seccommerce.de>
User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Frei Adrian (frr)" <frr@zhwin.ch>, ietf-ltans@imc.org
Subject: Re: LTANS: Examples of ERS data - cross checking of implementations
References: <55FEC03AF31CBE458B6B455F5214CAC74342CA@langouste.zhwin.ch>
In-Reply-To: <55FEC03AF31CBE458B6B455F5214CAC74342CA@langouste.zhwin.ch>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hello,

Frei Adrian (frr) wrote:
> Hmm, I think you misunderstood the generation of the reduced hash tree
> (I-D 3.2). The five lists in IXOS' hash tree are not five data object
> groups; they are five levels of the hash tree. The tree looks like 
 > this:
> 
>                     ROOT
>                       |                                      \   \
>                     YYYY                                   f79a 0000
>                       |                            \   \    /|\
>                     YYYY                          c414 3413 
>                       |                    \   \   /|\ /|\
>                     YYYY                 cf18 6ba0
>        /              |             \     /|\ /|\
>      YYYY (c4a8)    b837           46d8
>   /    |   \     /    |   \     /    |   \
> 51b1 5bd0 60bb XXXX XXXX XXXX XXXX XXXX XXXX
> data obj grp 1 data obj grp 2 data obj grp 3

Thank you for the explanation. If it is really meant to encode this
tree in the way the Ixos-example dit it, then how would it be possible
to encode the tree if I wanted to include the complete "data obj grp 2"
too? In the simple case that I only want to proove that a certain,
single data object exists in the tree, only a single data object group
has to be included in the reduced hash tree and the Ixos-encoding works
fine. But let "data obj grp 1" contain the hash over the signature of
a document and "data obj grp 2" the hash over the OCSP response for the
certificate of the person who signed the document. Then I would like
to have both hashes in the same reduced hash tree. Of course I could
create two independent evidence records where each contains the reduced
hash tree for one of the hashes. But it would be good to have every-
thing relating to one document (sig hash and OCSP response hash) in the
same evidence record.


>> Why is the last hash value 00...00? A hash which just happens to be
>> all zeros by coincidence? Or does it have a special meaning?
 >
> That's exactly because of 3.2.4. Since IXOS' tree contained something
> between 81 and 162 documents they had to include an additional (dummy)
> hash value (0000) to the last level of the tree to get a "complete"
> ternary hash tree.

Why is it necessary to have a complete ternary hash tree? The hash
computation would work well without the dummy.

Regards
Tilo



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1D7xXFZ004483; Sun, 12 Feb 2006 23:59:33 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1D7xX5D004482; Sun, 12 Feb 2006 23:59:33 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1D7xWLL004475 for <ietf-ltans@imc.org>; Sun, 12 Feb 2006 23:59:33 -0800 (PST) (envelope-from Andreas.U.Schmidt@sit.fraunhofer.de)
Received: from [141.12.87.229] (sitp225.sit.fraunhofer.de [141.12.68.225]) (authenticated bits=0) by mailext.sit.fraunhofer.de (8.13.1/8.13.1/9.9.9) with ESMTP id k1D7xOrr029143 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 13 Feb 2006 08:59:25 +0100
Message-ID: <43F03C99.5050907@sit.fraunhofer.de>
Date: Mon, 13 Feb 2006 09:00:25 +0100
From: "Andreas U. Schmidt" <Andreas.U.Schmidt@sit.fraunhofer.de>
Reply-To: Andreas.U.Schmidt@sit.fraunhofer.de
User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-ltans@imc.org
Subject: Re: comments on draft-ietf-ltans-pki-notareqs-03.txt
References: <1815FE0A4A30A44BA2F9E367E1B00AB130A450@corporativo.production.local>
In-Reply-To: <1815FE0A4A30A44BA2F9E367E1B00AB130A450@corporativo.production.local>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: by amavisd-new
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

The rationale was that *trust* comes always at a cost, e.g.,
external timestamping services are expensive not due to technical
reasons but rather since their certified trustworthiness and accuracy
comes at a cost to the clientele. That discriminates the use of trusted
service providers in a general way from outsourcing. Moreover,
a total system consisting of more trusted components is more
difficult to assess for security, which entails further cost.
Performance and scalability might indeed not be such a problem.
Is an explanation along the mentioned lines desirable?

AUS

Greg Werner wrote:

>Regarding:
>
>6.  Operational Considerations
>
>   Data validation and certification services may have strong
>   performance and scalability requirements.  A certification service
>   must be able to work efficiently even for large amounts of data
>   objects and requests.
>
>   In order to limit expenses and to achieve high performance, the
>   involvement of other trusted third parties should be minimized.
>
>I´m not sure I understand the second paragraph. Could someone please explain, it sounds as if the recommendation is to "limit expenses" however some companies may which to pay more for certain services to circumvent some possible risks (whatever those may be).
>
>It sounds like the recommendation is out of scope because this is a cost/benefit and ROI analysis that each company should do.
>
>Greg
>
>
>
>  
>



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1D7FIqW001715; Sun, 12 Feb 2006 23:15:18 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1D7FIM1001714; Sun, 12 Feb 2006 23:15:18 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mx2.zhwin.ch (mx2.zhwin.ch [160.85.104.51]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1D7FGRw001706 for <ietf-ltans@imc.org>; Sun, 12 Feb 2006 23:15:17 -0800 (PST) (envelope-from frr@zhwin.ch)
Received: from orwell.zhwin.ch ([160.85.104.31]) by mx2.zhwin.ch with esmtp (Exim 4.54) id 1F8XvS-0001rv-Gx; Mon, 13 Feb 2006 08:15:10 +0100
Received: from dove.zhwin.ch (Not Verified[160.85.196.13]) by orwell.zhwin.ch with NetIQ MailMarshal 6.0 Service Pack 1a (v6,0,3,33) id <B43f031d70000>; Mon, 13 Feb 2006 08:14:31 +0100
Received: from langouste.zhwin.ch ([160.85.196.12]) by dove.zhwin.ch with Microsoft SMTPSVC(6.0.3790.1830); Mon, 13 Feb 2006 08:15:10 +0100
x-mimeole: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: AW: LTANS: Examples of ERS data - cross checking of implementations
Date: Mon, 13 Feb 2006 08:15:09 +0100
Message-ID: <55FEC03AF31CBE458B6B455F5214CAC74342CA@langouste.zhwin.ch>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: LTANS: Examples of ERS data - cross checking of implementations
Thread-Index: AcYvTE78TBsA5QFPQNKeONfM2oYCuwBHIdsg
From: "Frei Adrian \(frr\)" <frr@zhwin.ch>
To: "Tilo Kienitz" <tk-tlslist@seccommerce.de>, <ietf-ltans@imc.org>
X-OriginalArrivalTime: 13 Feb 2006 07:15:10.0339 (UTC) FILETIME=[39A60D30:01C6306D]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k1D7FIRw001709
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hello,

Tilo Kienitz wrote:
> Thomas Kunz wrote:
>  > The procedure how to concatenate and hash the values in the reduced
>  > hashtree is decribed in section 3.3 of the I-D.
>  > You concatenate the three values (51B1..., 5BD0..., 60BB...) in the
>  > first list in ascending order an hash them with ripemd160. This
hash
>  > becomes member of the second list (B537..., 46D8...). Now you
>  > concatenate these three hash values (the two in the list and the
>  > calculated one) and hash them, etc. Continue this procedure until
the
>  > root hash is calculated. This root hash must correspond to the
hashed
>  > message in the timestamp.
> 
> I was able to compute the root hash and verify the first timestamp
this
> way. But I think the root hash has to be computed differently. The
> example contains the following hashes. I have noted all DER encoding
> bytes and named the data object groups A, B, C, D and E.
> 
> 30 81 fc
>    30 42 (data object group A)
>      04 14 51b178b4a09592d425b70972ba448eb0221d39d9
>      04 14 5bd0247c9f86b4b1fad7500f61fcd9e622651ad2
>      04 14 60bbc5706949fc4d191771b9a7743416a340f7ee
>    30 2c (data object group B)
>      04 14 b837fbd61b1c82644fd196892cf9fb1ee16a2473
>      04 14 46d8fc303bed6cfa433e8f09146acc2f2c32a51c
>    30 2c (data object group C)
>      04 14 cf18dda21b8d71d7c43e11b603b3c0c309986bd8
>      04 14 6ba0a0bb6cf43cb7665b1876aba9db4f903256b1
>    30 2c (data object group D)
>      04 14 c414a00a8e579e49cec5baab06abb577a6effea3
>      04 14 3413e337a9dbfd820a321550ef0bf82270b5e845
>    30 2c (data object group E)
>      04 14 f79a6ca87a7c741cf40aebaaa8918055f85810ea
>      04 14 0000000000000000000000000000000000000000
> 
> I agree on the first step which is to compute the hash over (51B1...,
> 5BD0..., 60BB...). It's C4A84457CAF1F7CD675754ECE406C429DE0B059F. But
> why should it be inserted into data object group B? I think the next
> step should be to generate the hashes over over data object groups B,
C,
> D and E without inserting anything. The resulting five hashes (one for
> each data object group) build the next higher list of hash values. I
> think this is meant by "This hash value h' must become member of the
> next higher list of hash values." Otherwise h' would become member of
> another list of hash values on the same level instead of the next
higher
> level. Data object groups A, B, C, D and E are on the same level.
> Then the hash over the binary sorted five computed hashes is
> 06E1045012391C2DCE1F673E6917EE2239EB5EA7. Finally this hash alone is
> hashed again, because there is another ASN1-sequence (DER tag and
> length: 30 81 fc) above it.
> The result is the root hash 0F42B6C261ACCF42AD55E005211ED1B168F373B9.
> Please correct me if I did not understand the example correctly.

Hmm, I think you misunderstood the generation of the reduced hash tree
(I-D 3.2). The five lists in IXOS' hash tree are not five data object
groups; they are five levels of the hash tree. The tree looks like this:

                    ROOT
                      |                                         \   \
                    YYYY                                      f79a 0000
                      |                              \   \     /|\
                    YYYY                            c414 3413 
                      |                     \   \    /|\ /|\
                    YYYY                  cf18 6ba0
       /              |             \      /|\ /|\
     YYYY (c4a8)    b837           46d8
  /    |   \     /    |   \     /    |   \
51b1 5bd0 60bb XXXX XXXX XXXX XXXX XXXX XXXX
data obj grp 1 data obj grp 2 data obj grp 3

> Why is the last hash value 00...00? A hash which just happens to be
all
> zeros by coincidence? Or does it have a special meaning?

That's exactly because of 3.2.4. Since IXOS' tree contained something
between 81 and 162 documents they had to include an additional (dummy)
hash value (0000) to the last level of the tree to get a "complete"
ternary hash tree.

Regards,

Adrian


Content Security by MailMarshal



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1BKPQtW065401; Sat, 11 Feb 2006 12:25:26 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1BKPQ1P065400; Sat, 11 Feb 2006 12:25:26 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mail.seccommerce.de (mail.seccommerce.de [62.109.87.71]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1BKPOAa065386 for <ietf-ltans@imc.org>; Sat, 11 Feb 2006 12:25:24 -0800 (PST) (envelope-from tk-tlslist@seccommerce.de)
Received: (qmail 3181 invoked from network); 11 Feb 2006 20:27:28 -0000
Received: from unknown (HELO ?127.0.0.1?) (192.168.1.10) by 0 with RC4-MD5 encrypted SMTP; 11 Feb 2006 20:27:28 -0000
Message-ID: <43EE4839.9050701@seccommerce.de>
Date: Sat, 11 Feb 2006 21:25:29 +0100
From: Tilo Kienitz <tk-tlslist@seccommerce.de>
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-ltans@imc.org
Subject: Re: LTANS: Examples of ERS data - cross checking of implementations
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hello,

first of all I would like to thank IXOS for posting an example of an ERS
and I would like to add something to the discussion of Adrian Frei and
Thomas Kunz.

Thomas Kunz wrote:
 > The procedure how to concatenate and hash the values in the reduced
 > hashtree is decribed in section 3.3 of the I-D.
 > You concatenate the three values (51B1..., 5BD0..., 60BB...) in the
 > first list in ascending order an hash them with ripemd160. This hash
 > becomes member of the second list (B537..., 46D8...). Now you
 > concatenate these three hash values (the two in the list and the
 > calculated one) and hash them, etc. Continue this procedure until the
 > root hash is calculated. This root hash must correspond to the hashed
 > message in the timestamp.

I was able to compute the root hash and verify the first timestamp this
way. But I think the root hash has to be computed differently. The
example contains the following hashes. I have noted all DER encoding
bytes and named the data object groups A, B, C, D and E.

30 81 fc
   30 42 (data object group A)
     04 14 51b178b4a09592d425b70972ba448eb0221d39d9
     04 14 5bd0247c9f86b4b1fad7500f61fcd9e622651ad2
     04 14 60bbc5706949fc4d191771b9a7743416a340f7ee
   30 2c (data object group B)
     04 14 b837fbd61b1c82644fd196892cf9fb1ee16a2473
     04 14 46d8fc303bed6cfa433e8f09146acc2f2c32a51c
   30 2c (data object group C)
     04 14 cf18dda21b8d71d7c43e11b603b3c0c309986bd8
     04 14 6ba0a0bb6cf43cb7665b1876aba9db4f903256b1
   30 2c (data object group D)
     04 14 c414a00a8e579e49cec5baab06abb577a6effea3
     04 14 3413e337a9dbfd820a321550ef0bf82270b5e845
   30 2c (data object group E)
     04 14 f79a6ca87a7c741cf40aebaaa8918055f85810ea
     04 14 0000000000000000000000000000000000000000

I agree on the first step which is to compute the hash over (51B1...,
5BD0..., 60BB...). It's C4A84457CAF1F7CD675754ECE406C429DE0B059F. But 
why should it be inserted into data object group B? I think the next 
step should be to generate the hashes over over data object groups B, C, 
D and E without inserting anything. The resulting five hashes (one for 
each data object group) build the next higher list of hash values. I 
think this is meant by "This hash value h' must become member of the 
next higher list of hash values." Otherwise h' would become member of 
another list of hash values on the same level instead of the next higher 
level. Data object groups A, B, C, D and E are on the same level.
Then the hash over the binary sorted five computed hashes is
06E1045012391C2DCE1F673E6917EE2239EB5EA7. Finally this hash alone is 
hashed again, because there is another ASN1-sequence (DER tag and 
length: 30 81 fc) above it.
The result is the root hash 0F42B6C261ACCF42AD55E005211ED1B168F373B9.
Please correct me if I did not understand the example correctly.

Why is the last hash value 00...00? A hash which just happens to be all
zeros by coincidence? Or does it have a special meaning?

Another question maybe for the authors of the draft. What is meant by 
3.2.4 "If additional hash values are needed, e.g. so that all nodes have 
the same number of children, any data may be hashed using H and used.)"
Why could it be important that all nodes have the same number of children?

Kind regards
Tilo Kienitz


--
SecCommerce GmbH
Hamburg



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1ANkdg9085161; Fri, 10 Feb 2006 15:46:39 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k1ANkd1n085160; Fri, 10 Feb 2006 15:46:39 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from advantage-security.com ([201.148.139.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k1ANkcZk085154 for <ietf-ltans@imc.org>; Fri, 10 Feb 2006 15:46:38 -0800 (PST) (envelope-from gwerner@advantage-security.com)
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Subject: comments on draft-ietf-ltans-pki-notareqs-03.txt
Date: Fri, 10 Feb 2006 17:46:31 -0600
Message-ID: <1815FE0A4A30A44BA2F9E367E1B00AB130A450@corporativo.production.local>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: comments on draft-ietf-ltans-pki-notareqs-03.txt
Thread-Index: AcYtUsOrmebO7tOLTbKwELOR1y4rVgAGsmEgAEuCGjA=
From: "Greg Werner" <gwerner@advantage-security.com>
To: <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k1ANkdZk085155
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Regarding:

6.  Operational Considerations

   Data validation and certification services may have strong
   performance and scalability requirements.  A certification service
   must be able to work efficiently even for large amounts of data
   objects and requests.

   In order to limit expenses and to achieve high performance, the
   involvement of other trusted third parties should be minimized.

I´m not sure I understand the second paragraph. Could someone please explain, it sounds as if the recommendation is to "limit expenses" however some companies may which to pay more for certain services to circumvent some possible risks (whatever those may be).

It sounds like the recommendation is out of scope because this is a cost/benefit and ROI analysis that each company should do.

Greg



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k19EP6X3039500; Thu, 9 Feb 2006 06:25:06 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k19EP64q039497; Thu, 9 Feb 2006 06:25:06 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from burrens.yandk.org (yhetheridge.org [64.139.78.42]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k19EP4h4039446 for <ietf-ltans@imc.org>; Thu, 9 Feb 2006 06:25:04 -0800 (PST) (envelope-from yhe@yhetheridge.org)
Received: from [192.168.1.11] (moors.yandk.org [192.168.1.11]) by burrens.yandk.org (Postfix) with ESMTP id 8296813CF6 for <ietf-ltans@imc.org>; Thu,  9 Feb 2006 09:25:03 -0500 (EST)
Message-ID: <43EB5196.3050303@yhetheridge.org>
Date: Thu, 09 Feb 2006 09:28:38 -0500
From: "Young H. Etheridge" <yhe@yhetheridge.org>
User-Agent: Thunderbird 1.5 (X11/20060111)
MIME-Version: 1.0
To: ietf-ltans@imc.org
Subject: comments on draft-ietf-ltans-ers-05.txt
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

I believe there are still some inconsistencies in the implied definition
of timestamp in various points of the draft.

For example, the implied definition seems to be well-stated in the last
paragraph of Section 3.2 on p. 11.  The last note, "[ANSX995], [I180142]
and [I180143] specify irrefutably verifiable time-stamps which do not
depend on certificates, CRLS, or OCSP-Responses", seems to be quite
adequately stated.  However, the definition of Time-Stamp in Section 1.3
on p. 5 states it as "A signed confirmation generated by a Time Stamping
Authority (TSA)".  I believe a more consistent statement would say it as
"A cryptographically secure confirmation generated by a Time Stamping
Authority (TSA)".

The inconsistency persists in the last paragraph of Section 3.1 on p.
9.  The statement, "Other types of time-stamp might be used, if they
contain time data, time-stamped data and a signature from the TSA of
these data" should for consistency's sake read as "Other types of
time-stamp might be used, if they contain time data, time-stamped data
and a cryptographically secure confirmation from the TSA of these data".

Thank you,

yhe



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k19BsVHC018349; Thu, 9 Feb 2006 03:54:31 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k19BsVpK018348; Thu, 9 Feb 2006 03:54:31 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k19BsUto018329 for <ietf-ltans@imc.org>; Thu, 9 Feb 2006 03:54:30 -0800 (PST) (envelope-from cwallace@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: RE: comments on draft-ietf-ltans-pki-retention-00.txt
Date: Thu, 9 Feb 2006 04:00:51 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C879012A18A6@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: comments on draft-ietf-ltans-pki-retention-00.txt
thread-index: AcYtUsOrmebO7tOLTbKwELOR1y4rVgAGsmEg
From: "Carl Wallace" <cwallace@orionsec.com>
To: <ietf-ltans@imc.org>, <bruno@wildhaber.com>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k19BsUto018343
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

<snip>
> - ERS is not the only service using certificates; we are here 
> talking about certificate management, which includes all kind 
> of certficates within an organisation
> - these are mainly policy oriented issues, e.g. the choice of 
> a specific certificate also includes a set of very complex 
> rules (CPS, Signature laws, inhouse rules et.al.) which 
> define the basics such as keeping the necessary verification 
> or revocation data

The choice of which certificate to use for a particular operation is
made before the events being addressed by LTANS.  The ERS/SCVP and
retention drafts aim to preserve certificates so these decisions can be
independent of the preservation of signed data.

> - how to keep this information is policy dependent and must 
> be managed by the organisation: --> risk management

Agreed.
 
> So the first thing will be to define the adequate 
> certificate/PKI/ policy  for your needs and then decide abou 
> the necessary cert.  
> management structure. Legally spoken: it is my responsibility 
> to store the necessary verification data, how I will do that, 
> should remain in my responsibility. Having said this, I do 
> not think this should be part of the LTANS standard.

Do you think LTANS specs can play a role here, i.e., ERS?  If not, what
specs apply?  The retention spec defines an optional binding between
certs and evidence records that enables you to fulfill your
responsibility of preserving the necessary verification data.  It's not
clear to me that certs must be preserved as part of a signed data object
especially since not doing this has significant benefit, e.g., storage
savings and decoupling trust anchors from signed data.

<snip>



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k198SEoH091294; Thu, 9 Feb 2006 00:28:14 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k198SE1w091293; Thu, 9 Feb 2006 00:28:14 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from ms8.webland.ch (ms8.webland.ch [194.209.78.138]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k198SCr2091276 for <ietf-ltans@imc.org>; Thu, 9 Feb 2006 00:28:13 -0800 (PST) (envelope-from bruno@wildhaber.com)
Received: from [192.168.1.41] ([83.77.221.93]) by ms8.webland.ch (Webland.MailServer.v.8.3.5) with ASMTP id NKL61905; Thu, 9 Feb 2006 09:28:05 +0100
In-Reply-To: <82D5657AE1F54347A734BDD33637C87901252CC1@EXVS01.ex.dslextreme.net>
References: <82D5657AE1F54347A734BDD33637C87901252CC1@EXVS01.ex.dslextreme.net>
Mime-Version: 1.0 (Apple Message framework v746.2)
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <1CE877BA-017B-4181-8D86-DBF814BFA05E@wildhaber.com>
Cc: "Tobias Gondrom" <tgondrom@opentext.com>, <ietf-ltans@imc.org>
Content-Transfer-Encoding: 7bit
From: Bruno Wildhaber <bruno@wildhaber.com>
Subject: Re: comments on draft-ietf-ltans-pki-retention-00.txt
Date: Thu, 9 Feb 2006 09:28:02 +0100
To: Carl Wallace <cwallace@orionsec.com>
X-Mailer: Apple Mail (2.746.2)
X-WLGenuine-Reason: [FILTER]=Local or Smtp Auth
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hi everybody

firstly thanks to all who contributed their time to the very valuable  
ERS standardization work!

Here are some thoughts abot the need for defining rules for retention  
of PKI artifacts

- ERS is not the only service using certificates; we are here talking  
about certificate management, which includes all kind of certficates  
within an organisation
- these are mainly policy oriented issues, e.g. the choice of a  
specific certificate also includes a set of very complex rules (CPS,  
Signature laws, inhouse rules et.al.) which define the basics such as  
keeping the necessary verification or revocation data
- how to keep this information is policy dependent and must be  
managed by the organisation: --> risk management

So the first thing will be to define the adequate certificate/PKI/ 
policy  for your needs and then decide abou the necessary cert.  
management structure. Legally spoken: it is my responsibility to  
store the necessary verification data, how I will do that, should  
remain in my responsibility. Having said this, I do not think this  
should be part of the LTANS standard.

Bruno



Am 08.02.2006 um 00:24 schrieb Carl Wallace:

>
> A few responses inline...
>
> <snip>
>>> From what I experienced today, the place where signed documents
>> (documents and their signatures) are stored, usually also
>> need to be able to at least store the list of certificates
>> and OCSP-response or CRL.
>> (as long as a user can not rely on an infrastructure besides
>> the local archiving system for providing this data, he
>> usually wants to store everything in one place so that he
>> later has all the data available).
>
> The local archiving system could still maintain the data, just not  
> over
> and over again for each data item.  The PKI artifacts could be stored
> separately and preserved once by the system maintaining the data.
>
>> Having this said I can see three approaches to store the
>> necessary data with the signed documents:
>> 1. to store the certificates (up to the root) and the
>> OCSP-response or CRL inside the signed document or signature
>> using RFC3126
>
> This assumes the one doing the storing shares common trust anchors  
> with
> all relying parties.  If the data is generally available for  
> consumption
> by many folks, such as in environments with bridged PKIs, this
> assumption may not hold.
>
>> 2. to store the necessary verification data
>> (certificates and OCSP-responses and/or CRL) in the same
>> storage system (and also applying Evidence Records to ensure
>> the integrity of them.
>
> This is possible using the mechanisms in the retention draft.
>
>> 3. To store with the document only a reference to the
>> verification data (certificates and OCSP-responses and/or
>> CRL), on another system that applies the Evidence Record
>> technique. This could be provided by e.g. a trust center or
>> better a redundant net of trust centers, each of them also
>> providing evidence for the historical date of the others.
>> (that way if one gets lost there are still some left....)
>
> This is also possible using the mechanisms in the retention draft.
>
>> Until such services are available I would recommend users to
>> store all necessary verification data directly in the signed
>> document: this costs more storage space but it makes sure
>> that the complete verification data is directly linked to the
>> signed document.
>
> In addition to storage space costs, it limits the verification
> possibilities beyond what is possible when verifying the data at
> generation time.
>
>> Tobias
>>
>>
>>

Wildhaber Consulting
Dr. Bruno Wildhaber, CISA/CISM
Seestrasse 100
8610 Uster
Schweiz
Tel. +41 44 826 21 21
Fax. +41 44 826 21 22
bruno@wildhaber.com
www.wildhaber.com

Daten recht im Griff?
1. Nationale Records Management Konferenz: Der Compliance Event 2006
http://www.aufbewahrung.ch/deutsch/pages/rm_conference.htm

The IT Governance Network
www.itgovernance.com

Kompetenzzentrum Records Management
www.aufbewahrung.ch





Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k18No6gZ021244; Wed, 8 Feb 2006 15:50:06 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k18No6Cv021243; Wed, 8 Feb 2006 15:50:06 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from newodin.ietf.org ([132.151.6.50]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k18No5cY021229 for <ietf-ltans@imc.org>; Wed, 8 Feb 2006 15:50:06 -0800 (PST) (envelope-from mlee@newodin.ietf.org)
Received: from mlee by newodin.ietf.org with local (Exim 4.43) id 1F6z4T-0007OL-HW; Wed, 08 Feb 2006 18:50:01 -0500
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
To: i-d-announce@ietf.org
Cc: ietf-ltans@imc.org
From: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ltans-ers-05.txt 
Message-Id: <E1F6z4T-0007OL-HW@newodin.ietf.org>
Date: Wed, 08 Feb 2006 18:50:01 -0500
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Long-Term Archive and Notary Services Working Group of the IETF.

	Title		: Evidence Record Syntax (ERS)
	Author(s)	: R. Brandner, et al.
	Filename	: draft-ietf-ltans-ers-05.txt
	Pages		: 26
	Date		: 2006-2-8
	
In many scenarios, users need to be able to ensure and prove the
   existence and integrity of data, especially digitally signed data, in
   a common and reproducible way over a long and possibly undetermined
   period of time.  This document specifies the syntax and processing of
   an Evidence Record, designed for long-term non-repudiation of
   existence of data, which particularly can be used for conservation of
   evidence of digitally signed data.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ltans-ers-05.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ltans-ers-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ltans-ers-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<2006-2-8173246.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ltans-ers-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ltans-ers-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<2006-2-8173246.I-D@ietf.org>

--OtherAccess--

--NextPart--



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17NIIxU021053; Tue, 7 Feb 2006 15:18:18 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k17NIIEQ021052; Tue, 7 Feb 2006 15:18:18 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17NIHqW021007 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 15:18:17 -0800 (PST) (envelope-from cwallace@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: RE: comments on draft-ietf-ltans-pki-retention-00.txt
Date: Tue, 7 Feb 2006 15:24:29 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C87901252CC1@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: comments on draft-ietf-ltans-pki-retention-00.txt
thread-index: AcYccYvMQAdzyJPhRC2i3EDgL+1gkgPqMNBwAAho0BA=
From: "Carl Wallace" <cwallace@orionsec.com>
To: "Tobias Gondrom" <tgondrom@opentext.com>, <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k17NIHqW021025
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

A few responses inline...

<snip>
> >From what I experienced today, the place where signed documents
> (documents and their signatures) are stored, usually also 
> need to be able to at least store the list of certificates 
> and OCSP-response or CRL.
> (as long as a user can not rely on an infrastructure besides 
> the local archiving system for providing this data, he 
> usually wants to store everything in one place so that he 
> later has all the data available).

The local archiving system could still maintain the data, just not over
and over again for each data item.  The PKI artifacts could be stored
separately and preserved once by the system maintaining the data.
 
> Having this said I can see three approaches to store the 
> necessary data with the signed documents:
> 1. to store the certificates (up to the root) and the 
> OCSP-response or CRL inside the signed document or signature 
> using RFC3126 

This assumes the one doing the storing shares common trust anchors with
all relying parties.  If the data is generally available for consumption
by many folks, such as in environments with bridged PKIs, this
assumption may not hold.

> 2. to store the necessary verification data 
> (certificates and OCSP-responses and/or CRL) in the same 
> storage system (and also applying Evidence Records to ensure 
> the integrity of them.

This is possible using the mechanisms in the retention draft.

> 3. To store with the document only a reference to the 
> verification data (certificates and OCSP-responses and/or 
> CRL), on another system that applies the Evidence Record 
> technique. This could be provided by e.g. a trust center or 
> better a redundant net of trust centers, each of them also 
> providing evidence for the historical date of the others. 
> (that way if one gets lost there are still some left....) 

This is also possible using the mechanisms in the retention draft.
 
> Until such services are available I would recommend users to 
> store all necessary verification data directly in the signed 
> document: this costs more storage space but it makes sure 
> that the complete verification data is directly linked to the 
> signed document.

In addition to storage space costs, it limits the verification
possibilities beyond what is possible when verifying the data at
generation time.
 
> Tobias
> 
> 
> 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17JOeLi088390; Tue, 7 Feb 2006 11:24:40 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k17JOenb088389; Tue, 7 Feb 2006 11:24:40 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mucmx02.ixos.de (mucmx02.ixos.de [149.235.128.47]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17JOcCC088382 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 11:24:39 -0800 (PST) (envelope-from tgondrom@opentext.com)
Received: from MUCXGC1.opentext.net (localhost [127.0.0.1]) by mucmx02.ixos.de (8.12.10+Sun/8.12.10) with ESMTP id k17JOaLt028615 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 20:24:37 +0100 (MET)
Content-class: urn:content-classes:message
Subject: comments on draft-ietf-ltans-pki-retention-00.txt
Date: Tue, 7 Feb 2006 20:24:55 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Message-ID: <3C1BE8610E44734499EF92FB35F5B07001938A93@MUCXGC1.opentext.net>
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: comments on draft-ietf-ltans-pki-retention-00.txt
Thread-Index: AcYccYvMQAdzyJPhRC2i3EDgL+1gkgPqMNBw
X-Priority: 5
Importance: low
From: "Tobias Gondrom" <tgondrom@opentext.com>
To: <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k17JOdCC088384
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hello, 

thanks for posting the pki-retention draft.

>From what I understood I like the data structure that would enable
(trusted?) third parties to provide such data as a service for the trust
centers in the future.

>From what I experienced today, the place where signed documents
(documents and their signatures) are stored, usually also need to be
able to at least store the list of certificates and OCSP-response or
CRL.
(as long as a user can not rely on an infrastructure besides the local
archiving system for providing this data, he usually wants to store
everything in one place so that he later has all the data available).

Having this said I can see three approaches to store the necessary data
with the signed documents:
1. to store the certificates (up to the root) and the OCSP-response or
CRL inside the signed document or signature using RFC3126
2. to store the necessary verification data (certificates and
OCSP-responses and/or CRL) in the same storage system (and also applying
Evidence Records to ensure the integrity of them.
3. To store with the document only a reference to the verification data
(certificates and OCSP-responses and/or CRL), on another system that
applies the Evidence Record technique. This could be provided by e.g. a
trust center or better a redundant net of trust centers, each of them
also providing evidence for the historical date of the others. (that way
if one gets lost there are still some left....) 

Until such services are available I would recommend users to store all
necessary verification data directly in the signed document: this costs
more storage space but it makes sure that the complete verification data
is directly linked to the signed document.

Tobias





Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17E56HS048648; Tue, 7 Feb 2006 06:05:06 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k17E56wr048647; Tue, 7 Feb 2006 06:05:06 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from host15.websitesource.com (host15.websitesource.com [209.239.32.38]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17E55sY048638 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 06:05:05 -0800 (PST) (envelope-from chokhani@orionsec.com)
Received: from wchokhani (static-70-21-114-242.res.east.verizon.net [70.21.114.242]) by host15.websitesource.com (8.12.10/8.12.10) with ESMTP id k17E53t9003451 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 09:05:03 -0500
From: "santosh chokhani" <chokhani@orionsec.com>
To: <ietf-ltans@imc.org>
Subject: RE: LTANS-ERS: Verification and data groups
Date: Tue, 7 Feb 2006 09:04:58 -0500
Message-ID: <001101c62bef$7dd49620$a900a8c0@hq.orionsec.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2670
thread-index: AcYrAfHmgNdObpscQ8+SlDwgqpJPlQANcGOgAA1PRMAAFcvhQAAIJqBwAACWpqAAAhWPIA==
In-Reply-To: <200602071301.k17D1LsN038464@above.proper.com>
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

That will be fine.  I am not as conversant in it, but will try to slog
through it.

-----Original Message-----
From: owner-ietf-ltans@mail.imc.org [mailto:owner-ietf-ltans@mail.imc.org]
On Behalf Of A. Jerman Blazic
Sent: Tuesday, February 07, 2006 8:09 AM
To: ietf-ltans@imc.org
Subject: RE: LTANS-ERS: Verification and data groups


Basic idea was presented, I think at paris meeting by Peter (Sylvester). We
are working with XML currently (it is a version 0.9 albeit in production
already...). Will that do?

> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org 
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Santosh Chokhani
> Sent: 7. februar 2006 13:55
> To: A. Jerman Blazic; ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> Aleksej,
> 
> Can you point me to or send me the ASN.1 for your proposal?
> 
> Thanks.
> 
> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
> Sent: Tuesday, February 07, 2006 4:34 AM
> To: ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> Santosh
> 
> Preserving of archive data is indeed performed as maintenance 
> of archive objects. Such objects are composed (or collected) 
> as they enter the archive and they in general consist of:
> 
> - archive data itself
> - metadata or any associated data (may come in flavor of 
> digital signatures, managerial data, etc...)
> - preservation/conservation data
> 
> The last element of the logical structure is what we try to 
> achieve with the ERS (but not only ERS!). Now, if 
> preservation is actually handling with archive objects the 
> preservation data must be an individual part of the object. 
> It really does not matter how the evidence information is 
> generated or collected, by grouping or not, the matter is 
> only that the evidence information as a part of the 
> preservation data and must always be decoupled for any common 
> evidence structure as the hash trees are. The ERS 
> specification as it is, lacks or redirects the focus on hash 
> trees and their generation. It solves the problem of 
> "degrouping" but statements such as retimestamping of the 
> whole hash tree are IMO wrong. There is no need to 
> retimestamp the whole hash structure but perform the same 
> type of operation on existing archive objects regardless of 
> the fact that they are in the group or not (you may always 
> build a new group form the elements of two or more groups). 
> Grouping is just another mechanism which may be used or not.
> The focus is really on the archive objects as they carry 
> evidence information individually.
> 
> Another problem of the current ERS specification are digest 
> algorithms.
> If I
> remember correctly the specification proposes the use of the 
> same algorithm through the hash structure, which is improper 
> approach. It is true that the chain is as strong as its 
> weakest element, but as we already have TAS requirement such 
> as transfer of archive data and its evidence from one archive 
> to another, sustaining the requirement of consistent hash 
> structure is just impossible.
> 
> What I propose is a better definition of the archival process 
> and the data structures to be defined by the LTANS. I tried 
> to summarize such ideas in the LTAP specification but am 
> afraid this is not the right document.
> 
> Aleksej
> 
> > -----Original Message-----
> > From: Santosh Chokhani [mailto:chokhani@orionsec.com]
> > Sent: 6. februar 2006 23:39
> > To: A. Jerman Blazic; ietf-ltans@imc.org
> > Subject: RE: LTANS-ERS: Verification and data groups
> > 
> > Aleksej,
> > 
> > If you proposing to replace the data groups and hash trees with the 
> > archive objects as simplification, I am in full agreement.
> > 
> > I am not sure this complexity is that useful or needed.
> > 
> > -----Original Message-----
> > From: owner-ietf-ltans@mail.imc.org
> > [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
> > Sent: Monday, February 06, 2006 11:15 AM
> > To: ietf-ltans@imc.org
> > Subject: RE: LTANS-ERS: Verification and data groups
> > 
> > 
> > > Of course it is up to the client to decide which data
> > object should be
> > > pooled into a group and which not. But a verification
> > component should
> > > be able to unambiguously decide if a document group is 
> complete or 
> > > not.
> > > With the structure I sketched, verification of a single
> > data object is
> > > still possible, but additionally it can be verified if 
> the group is 
> > > complete.
> > 
> > Hmm, I could hardly agree with this, as the ERS is meant 
> for providing 
> > evidence information of an object and not group of objects. The 
> > logical (or any other reason for) grouping is done by the 
> supportive 
> > infrastructure, e.g. data management (or DMS if you want). IMO the 
> > grouping is proposed purely as the answer to scalability 
> issues that 
> > may arise when handling significant amount of data. Basically the 
> > evidence creation process should perform necessary actions to group 
> > data objects in a way that a single evidence is enough. 
> Instantly the 
> > objects archived must be degrouped and no particular information is 
> > needed to identify the group members. This is out of the scope and 
> > that is exactly what the ERS does.
> > 
> > Aleksej
> > 
> 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17D1Mqg038475; Tue, 7 Feb 2006 05:01:22 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k17D1MJN038474; Tue, 7 Feb 2006 05:01:22 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from e5.ijs.si (kekec.e5.ijs.si [193.138.1.2]) by above.proper.com (8.12.11/8.12.9) with SMTP id k17D1LsN038464 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 05:01:21 -0800 (PST) (envelope-from aljosa@e5.ijs.si)
Message-Id: <200602071301.k17D1LsN038464@above.proper.com>
Received: (qmail 1900 invoked from network); 7 Feb 2006 13:01:18 -0000
Received: from localhost (127.0.0.1) by e5.ijs.si with SMTP; 7 Feb 2006 13:01:18 -0000
Received: from e5.ijs.si ([127.0.0.1]) by localhost (kekec.e5.ijs.si [127.0.0.1]) (amavisd-new, port 10024) with SMTP id 01867-01 for <ietf-ltans@imc.org>; Tue,  7 Feb 2006 14:01:17 +0100 (CET)
Received: (qmail 1896 invoked from network); 7 Feb 2006 13:01:16 -0000
Received: from arthur.e5.ijs.si (HELO Arthur) (193.138.1.27) by e5.ijs.si with SMTP; 7 Feb 2006 13:01:16 -0000
From: "A. Jerman Blazic" <aljosa@e5.ijs.si>
To: <ietf-ltans@imc.org>
Subject: RE: LTANS-ERS: Verification and data groups
Date: Tue, 7 Feb 2006 14:08:30 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
In-Reply-To: <82D5657AE1F54347A734BDD33637C8790120A3AD@EXVS01.ex.dslextreme.net>
thread-index: AcYrAfHmgNdObpscQ8+SlDwgqpJPlQANcGOgAA1PRMAAFcvhQAAIJqBwAACWpqA=
X-Virus-Scanned: amavisd-new at e5.ijs.si
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Basic idea was presented, I think at paris meeting by Peter (Sylvester). We
are working with XML currently (it is a version 0.9 albeit in production
already...). Will that do?

> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org 
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Santosh Chokhani
> Sent: 7. februar 2006 13:55
> To: A. Jerman Blazic; ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> Aleksej,
> 
> Can you point me to or send me the ASN.1 for your proposal?
> 
> Thanks.
> 
> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
> Sent: Tuesday, February 07, 2006 4:34 AM
> To: ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> Santosh
> 
> Preserving of archive data is indeed performed as maintenance 
> of archive objects. Such objects are composed (or collected) 
> as they enter the archive and they in general consist of:
> 
> - archive data itself
> - metadata or any associated data (may come in flavor of 
> digital signatures, managerial data, etc...)
> - preservation/conservation data
> 
> The last element of the logical structure is what we try to 
> achieve with the ERS (but not only ERS!). Now, if 
> preservation is actually handling with archive objects the 
> preservation data must be an individual part of the object. 
> It really does not matter how the evidence information is 
> generated or collected, by grouping or not, the matter is 
> only that the evidence information as a part of the 
> preservation data and must always be decoupled for any common 
> evidence structure as the hash trees are. The ERS 
> specification as it is, lacks or redirects the focus on hash 
> trees and their generation. It solves the problem of 
> "degrouping" but statements such as retimestamping of the 
> whole hash tree are IMO wrong. There is no need to 
> retimestamp the whole hash structure but perform the same 
> type of operation on existing archive objects regardless of 
> the fact that they are in the group or not (you may always 
> build a new group form the elements of two or more groups). 
> Grouping is just another mechanism which may be used or not.
> The focus is really on the archive objects as they carry 
> evidence information individually.
> 
> Another problem of the current ERS specification are digest 
> algorithms.
> If I
> remember correctly the specification proposes the use of the 
> same algorithm through the hash structure, which is improper 
> approach. It is true that the chain is as strong as its 
> weakest element, but as we already have TAS requirement such 
> as transfer of archive data and its evidence from one archive 
> to another, sustaining the requirement of consistent hash 
> structure is just impossible.
> 
> What I propose is a better definition of the archival process 
> and the data structures to be defined by the LTANS. I tried 
> to summarize such ideas in the LTAP specification but am 
> afraid this is not the right document.
> 
> Aleksej
> 
> > -----Original Message-----
> > From: Santosh Chokhani [mailto:chokhani@orionsec.com]
> > Sent: 6. februar 2006 23:39
> > To: A. Jerman Blazic; ietf-ltans@imc.org
> > Subject: RE: LTANS-ERS: Verification and data groups
> > 
> > Aleksej,
> > 
> > If you proposing to replace the data groups and hash trees with the 
> > archive objects as simplification, I am in full agreement.
> > 
> > I am not sure this complexity is that useful or needed.
> > 
> > -----Original Message-----
> > From: owner-ietf-ltans@mail.imc.org
> > [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
> > Sent: Monday, February 06, 2006 11:15 AM
> > To: ietf-ltans@imc.org
> > Subject: RE: LTANS-ERS: Verification and data groups
> > 
> > 
> > > Of course it is up to the client to decide which data
> > object should be
> > > pooled into a group and which not. But a verification
> > component should
> > > be able to unambiguously decide if a document group is 
> complete or 
> > > not.
> > > With the structure I sketched, verification of a single
> > data object is
> > > still possible, but additionally it can be verified if 
> the group is 
> > > complete.
> > 
> > Hmm, I could hardly agree with this, as the ERS is meant 
> for providing 
> > evidence information of an object and not group of objects. The 
> > logical (or any other reason for) grouping is done by the 
> supportive 
> > infrastructure, e.g. data management (or DMS if you want). IMO the 
> > grouping is proposed purely as the answer to scalability 
> issues that 
> > may arise when handling significant amount of data. Basically the 
> > evidence creation process should perform necessary actions to group 
> > data objects in a way that a single evidence is enough. 
> Instantly the 
> > objects archived must be degrouped and no particular information is 
> > needed to identify the group members. This is out of the scope and 
> > that is exactly what the ERS does.
> > 
> > Aleksej
> > 
> 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17CmhM8037173; Tue, 7 Feb 2006 04:48:43 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k17Cmh15037172; Tue, 7 Feb 2006 04:48:43 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k17CmgcD037165 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 04:48:42 -0800 (PST) (envelope-from chokhani@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: RE: LTANS-ERS: Verification and data groups
Date: Tue, 7 Feb 2006 04:54:53 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C8790120A3AD@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: LTANS-ERS: Verification and data groups
thread-index: AcYrAfHmgNdObpscQ8+SlDwgqpJPlQANcGOgAA1PRMAAFcvhQAAIJqBw
From: "Santosh Chokhani" <chokhani@orionsec.com>
To: "A. Jerman Blazic" <aljosa@e5.ijs.si>, <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k17CmhcD037167
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Aleksej,

Can you point me to or send me the ASN.1 for your proposal?

Thanks.

-----Original Message-----
From: owner-ietf-ltans@mail.imc.org
[mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
Sent: Tuesday, February 07, 2006 4:34 AM
To: ietf-ltans@imc.org
Subject: RE: LTANS-ERS: Verification and data groups


Santosh

Preserving of archive data is indeed performed as maintenance of archive
objects. Such objects are composed (or collected) as they enter the
archive
and they in general consist of:

- archive data itself
- metadata or any associated data (may come in flavor of digital
signatures,
managerial data, etc...)
- preservation/conservation data

The last element of the logical structure is what we try to achieve with
the
ERS (but not only ERS!). Now, if preservation is actually handling with
archive objects the preservation data must be an individual part of the
object. It really does not matter how the evidence information is
generated
or collected, by grouping or not, the matter is only that the evidence
information as a part of the preservation data and must always be
decoupled
for any common evidence structure as the hash trees are. The ERS
specification as it is, lacks or redirects the focus on hash trees and
their
generation. It solves the problem of "degrouping" but statements such as
retimestamping of the whole hash tree are IMO wrong. There is no need to
retimestamp the whole hash structure but perform the same type of
operation
on existing archive objects regardless of the fact that they are in the
group or not (you may always build a new group form the elements of two
or
more groups). Grouping is just another mechanism which may be used or
not.
The focus is really on the archive objects as they carry evidence
information individually.

Another problem of the current ERS specification are digest algorithms.
If I
remember correctly the specification proposes the use of the same
algorithm
through the hash structure, which is improper approach. It is true that
the
chain is as strong as its weakest element, but as we already have TAS
requirement such as transfer of archive data and its evidence from one
archive to another, sustaining the requirement of consistent hash
structure
is just impossible.

What I propose is a better definition of the archival process and the
data
structures to be defined by the LTANS. I tried to summarize such ideas
in
the LTAP specification but am afraid this is not the right document.

Aleksej

> -----Original Message-----
> From: Santosh Chokhani [mailto:chokhani@orionsec.com] 
> Sent: 6. februar 2006 23:39
> To: A. Jerman Blazic; ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> Aleksej,
> 
> If you proposing to replace the data groups and hash trees 
> with the archive objects as simplification, I am in full agreement.
> 
> I am not sure this complexity is that useful or needed.
> 
> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
> Sent: Monday, February 06, 2006 11:15 AM
> To: ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> > Of course it is up to the client to decide which data 
> object should be 
> > pooled into a group and which not. But a verification 
> component should 
> > be able to unambiguously decide if a document group is complete or 
> > not.
> > With the structure I sketched, verification of a single 
> data object is 
> > still possible, but additionally it can be verified if the group is 
> > complete.
> 
> Hmm, I could hardly agree with this, as the ERS is meant for 
> providing evidence information of an object and not group of 
> objects. The logical (or any other reason for) grouping is 
> done by the supportive infrastructure, e.g. data management 
> (or DMS if you want). IMO the grouping is proposed purely as 
> the answer to scalability issues that may arise when handling 
> significant amount of data. Basically the evidence creation 
> process should perform necessary actions to group data 
> objects in a way that a single evidence is enough. Instantly 
> the objects archived must be degrouped and no particular 
> information is needed to identify the group members. This is 
> out of the scope and that is exactly what the ERS does.
> 
> Aleksej
> 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k179Ql3P006852; Tue, 7 Feb 2006 01:26:47 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k179Qlse006851; Tue, 7 Feb 2006 01:26:47 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from e5.ijs.si (kekec.e5.ijs.si [193.138.1.2]) by above.proper.com (8.12.11/8.12.9) with SMTP id k179QjUE006839 for <ietf-ltans@imc.org>; Tue, 7 Feb 2006 01:26:46 -0800 (PST) (envelope-from aljosa@e5.ijs.si)
Message-Id: <200602070926.k179QjUE006839@above.proper.com>
Received: (qmail 22729 invoked from network); 7 Feb 2006 09:26:43 -0000
Received: from localhost (127.0.0.1) by e5.ijs.si with SMTP; 7 Feb 2006 09:26:43 -0000
Received: from e5.ijs.si ([127.0.0.1]) by localhost (kekec.e5.ijs.si [127.0.0.1]) (amavisd-new, port 10024) with SMTP id 22497-08 for <ietf-ltans@imc.org>; Tue,  7 Feb 2006 10:26:42 +0100 (CET)
Received: (qmail 22721 invoked from network); 7 Feb 2006 09:26:42 -0000
Received: from arthur.e5.ijs.si (HELO Arthur) (193.138.1.27) by e5.ijs.si with SMTP; 7 Feb 2006 09:26:42 -0000
From: "A. Jerman Blazic" <aljosa@e5.ijs.si>
To: <ietf-ltans@imc.org>
Subject: RE: LTANS-ERS: Verification and data groups
Date: Tue, 7 Feb 2006 10:33:56 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
thread-index: AcYrAfHmgNdObpscQ8+SlDwgqpJPlQANcGOgAA1PRMAAFcvhQA==
In-Reply-To: <82D5657AE1F54347A734BDD33637C87901209EC1@EXVS01.ex.dslextreme.net>
X-Virus-Scanned: amavisd-new at e5.ijs.si
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Santosh

Preserving of archive data is indeed performed as maintenance of archive
objects. Such objects are composed (or collected) as they enter the archive
and they in general consist of:

- archive data itself
- metadata or any associated data (may come in flavor of digital signatures,
managerial data, etc...)
- preservation/conservation data

The last element of the logical structure is what we try to achieve with the
ERS (but not only ERS!). Now, if preservation is actually handling with
archive objects the preservation data must be an individual part of the
object. It really does not matter how the evidence information is generated
or collected, by grouping or not, the matter is only that the evidence
information as a part of the preservation data and must always be decoupled
for any common evidence structure as the hash trees are. The ERS
specification as it is, lacks or redirects the focus on hash trees and their
generation. It solves the problem of "degrouping" but statements such as
retimestamping of the whole hash tree are IMO wrong. There is no need to
retimestamp the whole hash structure but perform the same type of operation
on existing archive objects regardless of the fact that they are in the
group or not (you may always build a new group form the elements of two or
more groups). Grouping is just another mechanism which may be used or not.
The focus is really on the archive objects as they carry evidence
information individually.

Another problem of the current ERS specification are digest algorithms. If I
remember correctly the specification proposes the use of the same algorithm
through the hash structure, which is improper approach. It is true that the
chain is as strong as its weakest element, but as we already have TAS
requirement such as transfer of archive data and its evidence from one
archive to another, sustaining the requirement of consistent hash structure
is just impossible.

What I propose is a better definition of the archival process and the data
structures to be defined by the LTANS. I tried to summarize such ideas in
the LTAP specification but am afraid this is not the right document.

Aleksej

> -----Original Message-----
> From: Santosh Chokhani [mailto:chokhani@orionsec.com] 
> Sent: 6. februar 2006 23:39
> To: A. Jerman Blazic; ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> Aleksej,
> 
> If you proposing to replace the data groups and hash trees 
> with the archive objects as simplification, I am in full agreement.
> 
> I am not sure this complexity is that useful or needed.
> 
> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
> Sent: Monday, February 06, 2006 11:15 AM
> To: ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> > Of course it is up to the client to decide which data 
> object should be 
> > pooled into a group and which not. But a verification 
> component should 
> > be able to unambiguously decide if a document group is complete or 
> > not.
> > With the structure I sketched, verification of a single 
> data object is 
> > still possible, but additionally it can be verified if the group is 
> > complete.
> 
> Hmm, I could hardly agree with this, as the ERS is meant for 
> providing evidence information of an object and not group of 
> objects. The logical (or any other reason for) grouping is 
> done by the supportive infrastructure, e.g. data management 
> (or DMS if you want). IMO the grouping is proposed purely as 
> the answer to scalability issues that may arise when handling 
> significant amount of data. Basically the evidence creation 
> process should perform necessary actions to group data 
> objects in a way that a single evidence is enough. Instantly 
> the objects archived must be degrouped and no particular 
> information is needed to identify the group members. This is 
> out of the scope and that is exactly what the ERS does.
> 
> Aleksej
> 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k16MWRxc017652; Mon, 6 Feb 2006 14:32:27 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k16MWR0C017651; Mon, 6 Feb 2006 14:32:27 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k16MWRee017637 for <ietf-ltans@imc.org>; Mon, 6 Feb 2006 14:32:27 -0800 (PST) (envelope-from chokhani@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: RE: LTANS-ERS: Verification and data groups
Date: Mon, 6 Feb 2006 14:38:33 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C87901209EC1@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: LTANS-ERS: Verification and data groups
thread-index: AcYrAfHmgNdObpscQ8+SlDwgqpJPlQANcGOgAA1PRMA=
From: "Santosh Chokhani" <chokhani@orionsec.com>
To: "A. Jerman Blazic" <aljosa@e5.ijs.si>, <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k16MWRee017646
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Aleksej,

If you proposing to replace the data groups and hash trees with the
archive objects as simplification, I am in full agreement.

I am not sure this complexity is that useful or needed.

-----Original Message-----
From: owner-ietf-ltans@mail.imc.org
[mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of A. Jerman Blazic
Sent: Monday, February 06, 2006 11:15 AM
To: ietf-ltans@imc.org
Subject: RE: LTANS-ERS: Verification and data groups


> Of course it is up to the client to decide which data object 
> should be pooled into a group and which not. But a 
> verification component should be able to unambiguously decide 
> if a document group is complete or not.
> With the structure I sketched, verification of a single data 
> object is still possible, but additionally it can be verified 
> if the group is complete.

Hmm, I could hardly agree with this, as the ERS is meant for providing
evidence information of an object and not group of objects. The logical
(or
any other reason for) grouping is done by the supportive infrastructure,
e.g. data management (or DMS if you want). IMO the grouping is proposed
purely as the answer to scalability issues that may arise when handling
significant amount of data. Basically the evidence creation process
should
perform necessary actions to group data objects in a way that a single
evidence is enough. Instantly the objects archived must be degrouped and
no
particular information is needed to identify the group members. This is
out
of the scope and that is exactly what the ERS does.

Aleksej



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k16G8NOU050765; Mon, 6 Feb 2006 08:08:23 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k16G8Nsv050764; Mon, 6 Feb 2006 08:08:23 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from e5.ijs.si (kekec.e5.ijs.si [193.138.1.2]) by above.proper.com (8.12.11/8.12.9) with SMTP id k16G8JTX050757 for <ietf-ltans@imc.org>; Mon, 6 Feb 2006 08:08:21 -0800 (PST) (envelope-from aljosa@e5.ijs.si)
Message-Id: <200602061608.k16G8JTX050757@above.proper.com>
Received: (qmail 12468 invoked from network); 6 Feb 2006 16:08:17 -0000
Received: from localhost (127.0.0.1) by e5.ijs.si with SMTP; 6 Feb 2006 16:08:17 -0000
Received: from e5.ijs.si ([127.0.0.1]) by localhost (kekec.e5.ijs.si [127.0.0.1]) (amavisd-new, port 10024) with SMTP id 11922-08 for <ietf-ltans@imc.org>; Mon,  6 Feb 2006 17:08:16 +0100 (CET)
Received: (qmail 12464 invoked from network); 6 Feb 2006 16:08:16 -0000
Received: from arthur.e5.ijs.si (HELO Arthur) (193.138.1.27) by e5.ijs.si with SMTP; 6 Feb 2006 16:08:16 -0000
From: "A. Jerman Blazic" <aljosa@e5.ijs.si>
To: <ietf-ltans@imc.org>
Subject: RE: LTANS-ERS: Verification and data groups
Date: Mon, 6 Feb 2006 17:15:28 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
Thread-Index: AcYrAfHmgNdObpscQ8+SlDwgqpJPlQANcGOg
In-Reply-To: <43E71938.30105@sit.fraunhofer.de>
X-Virus-Scanned: amavisd-new at e5.ijs.si
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

> Of course it is up to the client to decide which data object 
> should be pooled into a group and which not. But a 
> verification component should be able to unambiguously decide 
> if a document group is complete or not.
> With the structure I sketched, verification of a single data 
> object is still possible, but additionally it can be verified 
> if the group is complete.

Hmm, I could hardly agree with this, as the ERS is meant for providing
evidence information of an object and not group of objects. The logical (or
any other reason for) grouping is done by the supportive infrastructure,
e.g. data management (or DMS if you want). IMO the grouping is proposed
purely as the answer to scalability issues that may arise when handling
significant amount of data. Basically the evidence creation process should
perform necessary actions to group data objects in a way that a single
evidence is enough. Instantly the objects archived must be degrouped and no
particular information is needed to identify the group members. This is out
of the scope and that is exactly what the ERS does.

Aleksej



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k169dmdP096386; Mon, 6 Feb 2006 01:39:48 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k169dmtg096385; Mon, 6 Feb 2006 01:39:48 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k169dktO096378 for <ietf-ltans@imc.org>; Mon, 6 Feb 2006 01:39:47 -0800 (PST) (envelope-from thomas.kunz@sit.fraunhofer.de)
Received: from [141.12.87.208] (sitp144.sit.fraunhofer.de [141.12.68.144]) by mailext.sit.fraunhofer.de (8.13.1/8.13.1/9.9.9) with ESMTP id k169dSH3005768 for <ietf-ltans@imc.org>; Mon, 6 Feb 2006 10:39:39 +0100
Message-ID: <43E71938.30105@sit.fraunhofer.de>
Date: Mon, 06 Feb 2006 10:39:04 +0100
From: Thomas Kunz <thomas.kunz@sit.fraunhofer.de>
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-ltans@imc.org
Subject: Re: LTANS-ERS: Verification and data groups
References: <1815FE0A4A30A44BA2F9E367E1B00AB130A169@corporativo.production.local>
In-Reply-To: <1815FE0A4A30A44BA2F9E367E1B00AB130A169@corporativo.production.local>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: by amavisd-new
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Of course it is up to the client to decide which data object should be 
pooled into a group and which not. But a verification component should 
be able to unambiguously decide if a document group is complete or not.
With the structure I sketched, verification of a single data object is 
still possible, but additionally it can be verified if the group is 
complete.

Regards,
Thomas


Greg Werner wrote:
> In Mexico several banks, such as BBVA and HSBC, for example, have expressed interest in using a system that allows them to batch several documents into one group and segregate other documents, such as sensitive contracts, as single objects. As Jerman states below their reason to count on a system to verify single objects will depend on their specific needs, in this case it would be to mitigate legal risks.
> 
> Regards,
> 
> Greg Werner CISSP
> Advantage Security
> Tel. +52 55 5081 4366
> 
> -----Mensaje original-----
> De: owner-ietf-ltans@mail.imc.org [mailto:owner-ietf-ltans@mail.imc.org] En nombre de A. Jerman Blazic
> Enviado el: viernes, 03 de febrero de 2006 7:26
> Para: 'Carl Wallace'; 'Thomas Kunz'; 'Susanne Okunick'
> CC: ietf-ltans@imc.org
> Asunto: RE: LTANS-ERS: Verification and data groups
> 
> 
> That is correct. It is up to the client to decide which data should be
> grouped or not and this is included in the LTAP specification. Please bare
> in mind that grouping can happen for whatever reason: logically,
> semantically or any particular reason defined by a client (e.g. data
> accompanied with the meta data). However, verification of a single object
> MUST be possible at any time. Otherwise a service might hit scalability and
> confidentiality problems (imagine a case focused on specific document to be
> presented to the court and a case when such document is a group member...). 
> 
> 
>>-----Original Message-----
>>From: owner-ietf-ltans@mail.imc.org 
>>[mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Carl Wallace
>>Sent: 3. februar 2006 13:00
>>To: Thomas Kunz; Susanne Okunick
>>Cc: ietf-ltans@imc.org
>>Subject: RE: LTANS-ERS: Verification and data groups
>>
>>
>>If I recall correctly, this was to have been a feature of 
>>LTAP, i.e., at submission time a client could request that 
>>the data being submitted not be lumped into a larger 
>>grouping.  This is a different than what you've suggested but 
>>achieves a similar end.  If LTAP is foregone in favor of a 
>>binding to an existing protocol, like WebDAV, or 
>>directly-managed ERS structures, like in the ERS/SCVP draft 
>>where the SCVP server performs all of the maintenance, then 
>>the sort of structure you propose makes more sense to meet 
>>the grouping requirement.  I'm not sure it's a good idea to 
>>verify an evidence record without verifying each document in 
>>the group.
>>
>>
>>>-----Original Message-----
>>>From: owner-ietf-ltans@mail.imc.org
>>>[mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Thomas Kunz
>>>Sent: Friday, February 03, 2006 3:15 AM
>>>To: Susanne Okunick
>>>Cc: ietf-ltans@imc.org
>>>Subject: Re: LTANS-ERS: Verification and data groups
>>>
>>>
>>>Hello,
>>>
>>>I agree with Susanne. A solution could be to change the ASN.1 
>>>structure of the ArchiveTimestamp. The hash values of the data 
>>>object(s) could be stored in a separate sequence of octet 
>>
>>strings and 
>>
>>>the first list of the reduced hashtree only holds the hash 
>>
>>values of 
>>
>>>the siblings of the data object node. So the size of the 
>>
>>data object 
>>
>>>group can unambiguously determined.
>>>Perhaps the authors of the draft can give an opinion to 
>>
>>that problem?
>>
>>>Best regards,
>>>Thomas
>>>
>>>
>>>Susanne Okunick wrote:
>>>
>>>>Hello,
>>>>
>>>>At the verification of evidence records I get into difficulty. I 
>>>>think, sometimes the verification for data groups is not
>>>
>>>practicable!
>>>
>>>>For data groups consisting of more than one documents the 
>>
>>following 
>>
>>>>points have to be checked (compare example in the draft;
>>>
>>>page 10,11):
>>>
>>>>a) check whether the hash value of each data object is within the 
>>>>first sequence SEQ(h2b,h2c,h2a) in the reduced hashtree (
>>>
>>>h2b,h2c,h2a)
>>>
>>>>b) check whether the document group is complete. That
>>>
>>>means: All data
>>>
>>>>objects have to be available at the time of verification
>>>
>>>(d2a,d2b,d2c).
>>>
>>>>If a data group consits of five documents, I will need all five 
>>>>documents for the entire successfull verification.
>>>>
>>>>The first sequence of every reduced binary hashtree 
>>
>>consists of *at
>>
>>>>least* two hash values.
>>>>This is for 1) one data object or 2) a data group consisting of 
>>>>exactly two data objects!
>>>>My question: How to identify the right case?
>>>>
>>>>Assuming the following simple reduced binary hashtree:
>>>>[[h1a,h1b][h2][h3]]
>>>>
>>>>For verification you have to calculate the root of hash (h123):
>>>>h123=H( binary sorted and concatenated (h12, h3) ) h12=H( binary 
>>>>sorted and concatenated (h1ab, h2) ) | h3 h1ab = H( binary
>>>
>>>sorted and
>>>
>>>>concatenated (h1a, h1b) ) | h2 h1a | h1b
>>>>
>>>>Now there are two possibilities:
>>>>1) h1a and h1b don't build a data group => for whole
>>>
>>>verification you
>>>
>>>>need the data object "d1a" to show that the data object's
>>>
>>>hash value
>>>
>>>>is "h1a"
>>>>2) h1a and h1b are data objects of one data group => for
>>>
>>>verification
>>>
>>>>both data objects d1a and d1b must be available and you
>>>
>>>have to show
>>>
>>>>that both hash values are correctly computed
>>>>
>>>>Thus you never know (in case of having two hash values in 
>>
>>the first 
>>
>>>>sequence of reduced binary hashtree), whether one or two 
>>
>>documents 
>>
>>>>needed for verification.
>>>>
>>>>Best regards,
>>>>Susanne
>>>>
>>>>P. S. In case of ternary hashtrees there is the same
>>>
>>>problem: Do you
>>>
>>>>need one or three documents for correct verification?
>>>>
>>>
>>>
>>>--
>>>------------------------------------------------------------
>>>Dipl. Inf. Thomas Kunz
>>>Fraunhofer-Institut für Sichere Informationstechnologie SIT 
>>>Rheinstrasse 75
>>>D-64295 Darmstadt (Germany)
>>>Tel: +49-6151-869-60204
>>>------------------------------------------------------------
>>>e-mail: thomas.kunz@sit.fraunhofer.de
>>>
>>>http://www.sit.fraunhofer.de
>>>------------------------------------------------------------
>>>
>>>
>>
> 
> 
> 


-- 
------------------------------------------------------------
Dipl. Inf. Thomas Kunz
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Rheinstrasse 75
D-64295 Darmstadt (Germany)
Tel: +49-6151-869-60204
------------------------------------------------------------
e-mail: thomas.kunz@sit.fraunhofer.de

http://www.sit.fraunhofer.de
------------------------------------------------------------



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13GXDoF059341; Fri, 3 Feb 2006 08:33:13 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k13GXDPo059340; Fri, 3 Feb 2006 08:33:13 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from advantage-security.com ([201.148.139.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13GXCuJ059323 for <ietf-ltans@imc.org>; Fri, 3 Feb 2006 08:33:12 -0800 (PST) (envelope-from gwerner@advantage-security.com)
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Subject: RE: LTANS-ERS: Verification and data groups
Date: Fri, 3 Feb 2006 10:33:04 -0600
Message-ID: <1815FE0A4A30A44BA2F9E367E1B00AB130A169@corporativo.production.local>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: LTANS-ERS: Verification and data groups
Thread-Index: AcYonFucdo/mcmeTSjy8QBCYHtroUgAGuNXAAANfHBAABmmYAA==
From: "Greg Werner" <gwerner@advantage-security.com>
To: "A. Jerman Blazic" <aljosa@e5.ijs.si>, "Carl Wallace" <cwallace@orionsec.com>, "Thomas Kunz" <thomas.kunz@sit.fraunhofer.de>, "Susanne Okunick" <susanne.okunick@sit.fraunhofer.de>
Cc: <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k13GXCuJ059335
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

In Mexico several banks, such as BBVA and HSBC, for example, have expressed interest in using a system that allows them to batch several documents into one group and segregate other documents, such as sensitive contracts, as single objects. As Jerman states below their reason to count on a system to verify single objects will depend on their specific needs, in this case it would be to mitigate legal risks.

Regards,

Greg Werner CISSP
Advantage Security
Tel. +52 55 5081 4366

-----Mensaje original-----
De: owner-ietf-ltans@mail.imc.org [mailto:owner-ietf-ltans@mail.imc.org] En nombre de A. Jerman Blazic
Enviado el: viernes, 03 de febrero de 2006 7:26
Para: 'Carl Wallace'; 'Thomas Kunz'; 'Susanne Okunick'
CC: ietf-ltans@imc.org
Asunto: RE: LTANS-ERS: Verification and data groups


That is correct. It is up to the client to decide which data should be
grouped or not and this is included in the LTAP specification. Please bare
in mind that grouping can happen for whatever reason: logically,
semantically or any particular reason defined by a client (e.g. data
accompanied with the meta data). However, verification of a single object
MUST be possible at any time. Otherwise a service might hit scalability and
confidentiality problems (imagine a case focused on specific document to be
presented to the court and a case when such document is a group member...). 

> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org 
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Carl Wallace
> Sent: 3. februar 2006 13:00
> To: Thomas Kunz; Susanne Okunick
> Cc: ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> If I recall correctly, this was to have been a feature of 
> LTAP, i.e., at submission time a client could request that 
> the data being submitted not be lumped into a larger 
> grouping.  This is a different than what you've suggested but 
> achieves a similar end.  If LTAP is foregone in favor of a 
> binding to an existing protocol, like WebDAV, or 
> directly-managed ERS structures, like in the ERS/SCVP draft 
> where the SCVP server performs all of the maintenance, then 
> the sort of structure you propose makes more sense to meet 
> the grouping requirement.  I'm not sure it's a good idea to 
> verify an evidence record without verifying each document in 
> the group.
> 
> > -----Original Message-----
> > From: owner-ietf-ltans@mail.imc.org
> > [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Thomas Kunz
> > Sent: Friday, February 03, 2006 3:15 AM
> > To: Susanne Okunick
> > Cc: ietf-ltans@imc.org
> > Subject: Re: LTANS-ERS: Verification and data groups
> > 
> > 
> > Hello,
> > 
> > I agree with Susanne. A solution could be to change the ASN.1 
> > structure of the ArchiveTimestamp. The hash values of the data 
> > object(s) could be stored in a separate sequence of octet 
> strings and 
> > the first list of the reduced hashtree only holds the hash 
> values of 
> > the siblings of the data object node. So the size of the 
> data object 
> > group can unambiguously determined.
> > Perhaps the authors of the draft can give an opinion to 
> that problem?
> > 
> > Best regards,
> > Thomas
> > 
> > 
> > Susanne Okunick wrote:
> > > 
> > > Hello,
> > > 
> > > At the verification of evidence records I get into difficulty. I 
> > > think, sometimes the verification for data groups is not
> > practicable!
> > > 
> > > For data groups consisting of more than one documents the 
> following 
> > > points have to be checked (compare example in the draft;
> > page 10,11):
> > > a) check whether the hash value of each data object is within the 
> > > first sequence SEQ(h2b,h2c,h2a) in the reduced hashtree (
> > h2b,h2c,h2a)
> > > b) check whether the document group is complete. That
> > means: All data
> > > objects have to be available at the time of verification
> > (d2a,d2b,d2c).
> > > If a data group consits of five documents, I will need all five 
> > > documents for the entire successfull verification.
> > > 
> > > The first sequence of every reduced binary hashtree 
> consists of *at
> > > least* two hash values.
> > > This is for 1) one data object or 2) a data group consisting of 
> > > exactly two data objects!
> > > My question: How to identify the right case?
> > > 
> > > Assuming the following simple reduced binary hashtree:
> > > [[h1a,h1b][h2][h3]]
> > > 
> > > For verification you have to calculate the root of hash (h123):
> > > h123=H( binary sorted and concatenated (h12, h3) ) h12=H( binary 
> > > sorted and concatenated (h1ab, h2) ) | h3 h1ab = H( binary
> > sorted and
> > > concatenated (h1a, h1b) ) | h2 h1a | h1b
> > > 
> > > Now there are two possibilities:
> > > 1) h1a and h1b don't build a data group => for whole
> > verification you
> > > need the data object "d1a" to show that the data object's
> > hash value
> > > is "h1a"
> > > 2) h1a and h1b are data objects of one data group => for
> > verification
> > > both data objects d1a and d1b must be available and you
> > have to show
> > > that both hash values are correctly computed
> > > 
> > > Thus you never know (in case of having two hash values in 
> the first 
> > > sequence of reduced binary hashtree), whether one or two 
> documents 
> > > needed for verification.
> > > 
> > > Best regards,
> > > Susanne
> > > 
> > > P. S. In case of ternary hashtrees there is the same
> > problem: Do you
> > > need one or three documents for correct verification?
> > > 
> > 
> > 
> > --
> > ------------------------------------------------------------
> > Dipl. Inf. Thomas Kunz
> > Fraunhofer-Institut für Sichere Informationstechnologie SIT 
> > Rheinstrasse 75
> > D-64295 Darmstadt (Germany)
> > Tel: +49-6151-869-60204
> > ------------------------------------------------------------
> > e-mail: thomas.kunz@sit.fraunhofer.de
> > 
> > http://www.sit.fraunhofer.de
> > ------------------------------------------------------------
> > 
> > 
> 





Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13DJ1gE032046; Fri, 3 Feb 2006 05:19:01 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k13DJ1jc032045; Fri, 3 Feb 2006 05:19:01 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from e5.ijs.si (kekec.e5.ijs.si [193.138.1.2]) by above.proper.com (8.12.11/8.12.9) with SMTP id k13DIx3a032033 for <ietf-ltans@imc.org>; Fri, 3 Feb 2006 05:19:00 -0800 (PST) (envelope-from aljosa@e5.ijs.si)
Message-Id: <200602031319.k13DIx3a032033@above.proper.com>
Received: (qmail 24874 invoked from network); 3 Feb 2006 13:18:58 -0000
Received: from localhost (127.0.0.1) by e5.ijs.si with SMTP; 3 Feb 2006 13:18:58 -0000
Received: from e5.ijs.si ([127.0.0.1]) by localhost (kekec.e5.ijs.si [127.0.0.1]) (amavisd-new, port 10024) with SMTP id 23044-10 for <ietf-ltans@imc.org>; Fri,  3 Feb 2006 14:18:54 +0100 (CET)
Received: (qmail 24851 invoked from network); 3 Feb 2006 13:18:54 -0000
Received: from arthur.e5.ijs.si (HELO Arthur) (193.138.1.27) by e5.ijs.si with SMTP; 3 Feb 2006 13:18:54 -0000
From: "A. Jerman Blazic" <aljosa@e5.ijs.si>
To: "'Carl Wallace'" <cwallace@orionsec.com>, "'Thomas Kunz'" <thomas.kunz@sit.fraunhofer.de>, "'Susanne Okunick'" <susanne.okunick@sit.fraunhofer.de>
Cc: <ietf-ltans@imc.org>
Subject: RE: LTANS-ERS: Verification and data groups
Date: Fri, 3 Feb 2006 14:26:01 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
Thread-Index: AcYonFucdo/mcmeTSjy8QBCYHtroUgAGuNXAAANfHBA=
In-Reply-To: <82D5657AE1F54347A734BDD33637C87901138C1D@EXVS01.ex.dslextreme.net>
X-Virus-Scanned: amavisd-new at e5.ijs.si
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k13DJ13a032040
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

That is correct. It is up to the client to decide which data should be
grouped or not and this is included in the LTAP specification. Please bare
in mind that grouping can happen for whatever reason: logically,
semantically or any particular reason defined by a client (e.g. data
accompanied with the meta data). However, verification of a single object
MUST be possible at any time. Otherwise a service might hit scalability and
confidentiality problems (imagine a case focused on specific document to be
presented to the court and a case when such document is a group member...). 

> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org 
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Carl Wallace
> Sent: 3. februar 2006 13:00
> To: Thomas Kunz; Susanne Okunick
> Cc: ietf-ltans@imc.org
> Subject: RE: LTANS-ERS: Verification and data groups
> 
> 
> If I recall correctly, this was to have been a feature of 
> LTAP, i.e., at submission time a client could request that 
> the data being submitted not be lumped into a larger 
> grouping.  This is a different than what you've suggested but 
> achieves a similar end.  If LTAP is foregone in favor of a 
> binding to an existing protocol, like WebDAV, or 
> directly-managed ERS structures, like in the ERS/SCVP draft 
> where the SCVP server performs all of the maintenance, then 
> the sort of structure you propose makes more sense to meet 
> the grouping requirement.  I'm not sure it's a good idea to 
> verify an evidence record without verifying each document in 
> the group.
> 
> > -----Original Message-----
> > From: owner-ietf-ltans@mail.imc.org
> > [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Thomas Kunz
> > Sent: Friday, February 03, 2006 3:15 AM
> > To: Susanne Okunick
> > Cc: ietf-ltans@imc.org
> > Subject: Re: LTANS-ERS: Verification and data groups
> > 
> > 
> > Hello,
> > 
> > I agree with Susanne. A solution could be to change the ASN.1 
> > structure of the ArchiveTimestamp. The hash values of the data 
> > object(s) could be stored in a separate sequence of octet 
> strings and 
> > the first list of the reduced hashtree only holds the hash 
> values of 
> > the siblings of the data object node. So the size of the 
> data object 
> > group can unambiguously determined.
> > Perhaps the authors of the draft can give an opinion to 
> that problem?
> > 
> > Best regards,
> > Thomas
> > 
> > 
> > Susanne Okunick wrote:
> > > 
> > > Hello,
> > > 
> > > At the verification of evidence records I get into difficulty. I 
> > > think, sometimes the verification for data groups is not
> > practicable!
> > > 
> > > For data groups consisting of more than one documents the 
> following 
> > > points have to be checked (compare example in the draft;
> > page 10,11):
> > > a) check whether the hash value of each data object is within the 
> > > first sequence SEQ(h2b,h2c,h2a) in the reduced hashtree (
> > h2b,h2c,h2a)
> > > b) check whether the document group is complete. That
> > means: All data
> > > objects have to be available at the time of verification
> > (d2a,d2b,d2c).
> > > If a data group consits of five documents, I will need all five 
> > > documents for the entire successfull verification.
> > > 
> > > The first sequence of every reduced binary hashtree 
> consists of *at
> > > least* two hash values.
> > > This is for 1) one data object or 2) a data group consisting of 
> > > exactly two data objects!
> > > My question: How to identify the right case?
> > > 
> > > Assuming the following simple reduced binary hashtree:
> > > [[h1a,h1b][h2][h3]]
> > > 
> > > For verification you have to calculate the root of hash (h123):
> > > h123=H( binary sorted and concatenated (h12, h3) ) h12=H( binary 
> > > sorted and concatenated (h1ab, h2) ) | h3 h1ab = H( binary
> > sorted and
> > > concatenated (h1a, h1b) ) | h2 h1a | h1b
> > > 
> > > Now there are two possibilities:
> > > 1) h1a and h1b don't build a data group => for whole
> > verification you
> > > need the data object "d1a" to show that the data object's
> > hash value
> > > is "h1a"
> > > 2) h1a and h1b are data objects of one data group => for
> > verification
> > > both data objects d1a and d1b must be available and you
> > have to show
> > > that both hash values are correctly computed
> > > 
> > > Thus you never know (in case of having two hash values in 
> the first 
> > > sequence of reduced binary hashtree), whether one or two 
> documents 
> > > needed for verification.
> > > 
> > > Best regards,
> > > Susanne
> > > 
> > > P. S. In case of ternary hashtrees there is the same
> > problem: Do you
> > > need one or three documents for correct verification?
> > > 
> > 
> > 
> > --
> > ------------------------------------------------------------
> > Dipl. Inf. Thomas Kunz
> > Fraunhofer-Institut für Sichere Informationstechnologie SIT 
> > Rheinstrasse 75
> > D-64295 Darmstadt (Germany)
> > Tel: +49-6151-869-60204
> > ------------------------------------------------------------
> > e-mail: thomas.kunz@sit.fraunhofer.de
> > 
> > http://www.sit.fraunhofer.de
> > ------------------------------------------------------------
> > 
> > 
> 




Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13BrxXS020029; Fri, 3 Feb 2006 03:53:59 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k13Brxdo020028; Fri, 3 Feb 2006 03:53:59 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from EXVS01.ex.dslextreme.net (netblock-66.51.199.51.dslextreme.com [66.51.199.51] (may be forged)) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13BrxgC020013 for <ietf-ltans@imc.org>; Fri, 3 Feb 2006 03:53:59 -0800 (PST) (envelope-from cwallace@orionsec.com)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Subject: RE: LTANS-ERS: Verification and data groups
Date: Fri, 3 Feb 2006 03:59:32 -0800
Message-ID: <82D5657AE1F54347A734BDD33637C87901138C1D@EXVS01.ex.dslextreme.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: LTANS-ERS: Verification and data groups
thread-index: AcYonFucdo/mcmeTSjy8QBCYHtroUgAGuNXA
From: "Carl Wallace" <cwallace@orionsec.com>
To: "Thomas Kunz" <thomas.kunz@sit.fraunhofer.de>, "Susanne Okunick" <susanne.okunick@sit.fraunhofer.de>
Cc: <ietf-ltans@imc.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by above.proper.com id k13BrxgC020023
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

If I recall correctly, this was to have been a feature of LTAP, i.e., at submission time a client could request that the data being submitted not be lumped into a larger grouping.  This is a different than what you've suggested but achieves a similar end.  If LTAP is foregone in favor of a binding to an existing protocol, like WebDAV, or directly-managed ERS structures, like in the ERS/SCVP draft where the SCVP server performs all of the maintenance, then the sort of structure you propose makes more sense to meet the grouping requirement.  I'm not sure it's a good idea to verify an evidence record without verifying each document in the group.

> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org 
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of Thomas Kunz
> Sent: Friday, February 03, 2006 3:15 AM
> To: Susanne Okunick
> Cc: ietf-ltans@imc.org
> Subject: Re: LTANS-ERS: Verification and data groups
> 
> 
> Hello,
> 
> I agree with Susanne. A solution could be to change the ASN.1 
> structure of the ArchiveTimestamp. The hash values of the 
> data object(s) could be stored in a separate sequence of 
> octet strings and the first list of the reduced hashtree only 
> holds the hash values of the siblings of the data object 
> node. So the size of the data object group can unambiguously 
> determined.
> Perhaps the authors of the draft can give an opinion to that problem?
> 
> Best regards,
> Thomas
> 
> 
> Susanne Okunick wrote:
> > 
> > Hello,
> > 
> > At the verification of evidence records I get into difficulty. I 
> > think, sometimes the verification for data groups is not 
> practicable!
> > 
> > For data groups consisting of more than one documents the following 
> > points have to be checked (compare example in the draft; 
> page 10,11):
> > a) check whether the hash value of each data object is within the 
> > first sequence SEQ(h2b,h2c,h2a) in the reduced hashtree ( 
> h2b,h2c,h2a)
> > b) check whether the document group is complete. That 
> means: All data 
> > objects have to be available at the time of verification 
> (d2a,d2b,d2c).
> > If a data group consits of five documents, I will need all five 
> > documents for the entire successfull verification.
> > 
> > The first sequence of every reduced binary hashtree consists of *at
> > least* two hash values.
> > This is for 1) one data object or 2) a data group consisting of 
> > exactly two data objects!
> > My question: How to identify the right case?
> > 
> > Assuming the following simple reduced binary hashtree:
> > [[h1a,h1b][h2][h3]]
> > 
> > For verification you have to calculate the root of hash (h123):
> > h123=H( binary sorted and concatenated (h12, h3) ) h12=H( binary 
> > sorted and concatenated (h1ab, h2) ) | h3 h1ab = H( binary 
> sorted and 
> > concatenated (h1a, h1b) ) | h2 h1a | h1b
> > 
> > Now there are two possibilities:
> > 1) h1a and h1b don't build a data group => for whole 
> verification you 
> > need the data object "d1a" to show that the data object's 
> hash value 
> > is "h1a"
> > 2) h1a and h1b are data objects of one data group => for 
> verification 
> > both data objects d1a and d1b must be available and you 
> have to show 
> > that both hash values are correctly computed
> > 
> > Thus you never know (in case of having two hash values in the first 
> > sequence of reduced binary hashtree), whether one or two documents 
> > needed for verification.
> > 
> > Best regards,
> > Susanne
> > 
> > P. S. In case of ternary hashtrees there is the same 
> problem: Do you 
> > need one or three documents for correct verification?
> > 
> 
> 
> --
> ------------------------------------------------------------
> Dipl. Inf. Thomas Kunz
> Fraunhofer-Institut für Sichere Informationstechnologie SIT 
> Rheinstrasse 75
> D-64295 Darmstadt (Germany)
> Tel: +49-6151-869-60204
> ------------------------------------------------------------
> e-mail: thomas.kunz@sit.fraunhofer.de
> 
> http://www.sit.fraunhofer.de
> ------------------------------------------------------------
> 
> 



Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k138FMCr085648; Fri, 3 Feb 2006 00:15:22 -0800 (PST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k138FMbP085647; Fri, 3 Feb 2006 00:15:22 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k138FKuJ085615 for <ietf-ltans@imc.org>; Fri, 3 Feb 2006 00:15:21 -0800 (PST) (envelope-from thomas.kunz@sit.fraunhofer.de)
Received: from [141.12.87.208] (sitp21.sit.fraunhofer.de [141.12.68.21]) by mailext.sit.fraunhofer.de (8.13.1/8.13.1/9.9.9) with ESMTP id k138FDaV001157; Fri, 3 Feb 2006 09:15:13 +0100
Message-ID: <43E310F8.4070505@sit.fraunhofer.de>
Date: Fri, 03 Feb 2006 09:14:48 +0100
From: Thomas Kunz <thomas.kunz@sit.fraunhofer.de>
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Susanne Okunick <susanne.okunick@sit.fraunhofer.de>
CC: ietf-ltans@imc.org
Subject: Re: LTANS-ERS: Verification and data groups
References: <43D78E7E.20809@sit.fraunhofer.de>
In-Reply-To: <43D78E7E.20809@sit.fraunhofer.de>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: by amavisd-new
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org>

Hello,

I agree with Susanne. A solution could be to change the ASN.1 structure 
of the ArchiveTimestamp. The hash values of the data object(s) could be 
stored in a separate sequence of octet strings and the first list of the 
reduced hashtree only holds the hash values of the siblings of the data 
object node. So the size of the data object group can unambiguously 
determined.
Perhaps the authors of the draft can give an opinion to that problem?

Best regards,
Thomas


Susanne Okunick wrote:
> 
> Hello,
> 
> At the verification of evidence records I get into difficulty. I think, 
> sometimes the verification for data groups is not practicable!
> 
> For data groups consisting of more than one documents the following 
> points have to be checked (compare example in the draft; page 10,11):
> a) check whether the hash value of each data object is within the first 
> sequence SEQ(h2b,h2c,h2a) in the reduced hashtree ( h2b,h2c,h2a)
> b) check whether the document group is complete. That means: All data 
> objects have to be available at the time of verification (d2a,d2b,d2c).
> If a data group consits of five documents, I will need all five 
> documents for the entire successfull verification.
> 
> The first sequence of every reduced binary hashtree consists of *at 
> least* two hash values.
> This is for 1) one data object or 2) a data group consisting of exactly 
> two data objects!
> My question: How to identify the right case?
> 
> Assuming the following simple reduced binary hashtree:
> [[h1a,h1b][h2][h3]]
> 
> For verification you have to calculate the root of hash (h123):
> h123=H( binary sorted and concatenated (h12, h3) )
> h12=H( binary sorted and concatenated (h1ab, h2) ) | h3
> h1ab = H( binary sorted and concatenated (h1a, h1b) ) | h2
> h1a | h1b
> 
> Now there are two possibilities:
> 1) h1a and h1b don't build a data group => for whole verification you 
> need the data object "d1a" to show that the data object's hash value is 
> "h1a"
> 2) h1a and h1b are data objects of one data group => for verification 
> both data objects d1a and d1b must be available and you have to show 
> that both hash values are correctly computed
> 
> Thus you never know (in case of having two hash values in the first 
> sequence of reduced binary hashtree), whether one or two documents 
> needed for verification.
> 
> Best regards,
> Susanne
> 
> P. S. In case of ternary hashtrees there is the same problem: Do you 
> need one or three documents for correct verification?
> 


-- 
------------------------------------------------------------
Dipl. Inf. Thomas Kunz
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Rheinstrasse 75
D-64295 Darmstadt (Germany)
Tel: +49-6151-869-60204
------------------------------------------------------------
e-mail: thomas.kunz@sit.fraunhofer.de

http://www.sit.fraunhofer.de
------------------------------------------------------------


