OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   Re: [xml-dev] Browser innovation efforts -- where's W3C in thispicture?

[ Lists Home | Date Index | Thread Index ]

> It's a slight overstatement -- very occasionally it is, in fact, necessary
> to make uncomfortably large specifications -- but for the most part, I agree
> with it.  Profiles are a pragmatic way to salvage something from a morbidly
> obese specification, but they also significantly increase compatibility
> problems: if you have n different profiles, then you have n^2-1 lines of
> incompability.

Sometimes a spec isn't huge, but is instead a simple container. Many
security specs are written this way.  For example, the IETF has profiled
X.509 certificates and Liberty is a profile of SAML.

Sometimes (again, in the security world), the data format itself must be
well-designed or it can be a weak spot.  For example, Bleichenbacher's
attack that made newspaper hbeadlines in 1998 was because he found a
weakness in how the RSA signature was padded to fill out a buffer. So,
once you get a secure data format, you often leave it "open" so that
various crypto mechanisms (RSA, DSA, etc) can be used within that data
format.  In this case, you need a profile to determine which crypto to
actually use.  An example of this is WS-I Basic Security Profile of
WS-Security, which itself profiles/specifies/refines how to use XML DSIG
and XML Encryption to cryptographically secure SOAP messages.

Hope this helps.
	/r$
--
Rich Salz                  Chief Security Architect
DataPower Technology       http://www.datapower.com
XS40 XML Security Gateway  http://www.datapower.com/products/xs40.html
XML Security Overview      http://www.datapower.com/xmldev/xmlsecurity.html






 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS