-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JAdES/JAdESCC - additional protected/unprotected claims #41
Comments
Dear Alen, I am currently on holidays. As soon as I come back from them (beginning of September), I will properly react to your comments Best regards |
Hi. Here's a related proposal in the OID(C) for transporting verifier and issuer related attributes in the header in an ETSI-compliant way: openid/OpenID4VP#36 Here's also a short overview of a JSON (W3C VC)-based trust model: https://ec.europa.eu/digital-building-blocks/wikis/display/EBSIDOC/Issuers+trust+model+-+Accreditation+of+Issuers and related JSON schemas: https://code.europa.eu/ebsi/json-schema/-/tree/main/schemas/ebsi-accreditation A related question: w3c/vc-test-suite#134 We're trying to follow the best architecture design practices (not mixing different contexts) which is also reflected in the design of JAdES. Signer attributes provide a nice way to transport additional credentials about the signer. W3C Verifiable Credentials allow to add issuer-related claims to the payload since issuer property is an object and is easily extensible. We seek opinion of experts in the W3C and this WG on what is the best way to transport additional issuer related credentials. In all our designs we're assuming that issuer != signer to avoid mixing of different contexts when that's actually the case (e.g., issuer may delegate the signing to an authorised 3rd party) A similar example appears in delegated authorisation model: https://code.europa.eu/ebsi/json-schema/-/tree/feat/ebsiint-7198/schemas/ebsi-authorisation Thank you and I hope I didn't stretch the question too much. |
Good morning Alen,
As for the JAdESCC, indeed, the warning that it throws in the case you mention, assuming that I have correctly understood it, just signals that JAdESCC is unable to understand the header parameter, nothing else. Please also note that JAdESCC does not say whether a signature is valid or invalid, it only says whether the signature is conformant or not to the JAdES specification. A signature may be conformant but be invalid (certificate expired for instance). Validation of AdES signatures is standardised in ETSI EN 319 102-1. Finally, I will take a look to the references that you mention in your last comment as soon as possible, and keep you posted on the evolution of JAdES spec. ETSI has strict rules on the distribution of draft documents (in general drafts are managed internally by the committees, and only in certain occassions it is allowed to make them public for getting comments from stakeholders). Once again, thank you very much indeed for your very valuable comments and interest in both JAdES spec and JAdESCC tool. |
Good morning @jccruellas. Thank you for a swift response. wrt point 3 (please note that the different credentials come from different standards/projects):
We can put the signer-related information in the signedAssertions. Thank you for the great work! |
Good afternoon Alen, Could I ask you to confirm if I have correctly understood your initial thinking on the bulleted list that you provided? |
|
|
Sorry: I did want to have all the text in one comment, but somehow I failed. Will keep going:
Am I understanding more or less what you mean to say? |
No worries :)
Yes, your understanding is correct and thank you for the clarification and confirmation. |
Hi,
with the evolution of new standards, formats (e.g., Decentralised identifiers, DID Documents, Verifiable Credentials) and decentralised PKI, we're trying to establish an additional way of signing key and signer information attestation and validation (next to the existing x509).
This requires additional protected/unprotected claims.
It seems that JAdESCC has a strict validation of etsiU parameters (I guess same applies for the protected header parameters).
Is there a way to include additional claims to protected/unprotected header in a conformant way or would that require extension of the JAdES standard?
Examples: adding signer attributes as W3C Verifiable Credentials (certified signer attribute supports only x509 format), or including additional information in the unprotected header (either disclosed claims in case of selective disclosure, revocation information in a different format, issuer accreditations, etc.)
Thank you!
The text was updated successfully, but these errors were encountered: