Movatterモバイル変換


[0]ホーム

URL:


W3CTechnology and Society Domain|XKMS home

XKMS Candidate Recommendation Implementation Report

Created: 12 Jan 2005

Last revised by $Author: kahan $ on $Date: 13 April 2005 - 19:02:22$

Table Of Contents

1. Introduction

In order to move forward the XKMS specification from CandidateRecommendation to Proposed Recommendation status, the XKMS Working Group (WG)had to give enough implementation experience to satisfy the PR entrancecriteria. The method adopted by the WG was to create anXKMSAssertions and Test Collection. This document ennumerate all theassertions on the XKMS specification, specify tests for these assertions or,otherwise, give rationale as to why an assertion could not be tested. Thetests were grouped into four categories: X-KISS, X-KRSS, Compound, andOptional, corresponding to the two basic XKMS services, combining multiplerequests, and finally, tests for optional features, respectively.

2. Modifications to ProposedRecommendation Entrance Criteria

The following Entrance Criteria were proposed in the XKMS CandidateRecommendationannouncement (you need a W3C member password to browse this link):

The Working Group succesfully tested all of the HTTP Transport andSoap 1.2/1.1 bindings, As a result of the feedback received, theSecurity Binding sections was made more concise and clear and nowlists a number of security considerations and how these considerationscould be taken into account by the XKMS payload security features, theTLS ones, or by a combination of both of these. Although there were nospecific tests for the payload security bindings, all of the XKMSfeatures on which these bindings depend were included in one or moreof the tests. The TLS bindings were not tested as the developers feltit was out of scope for the XKMS interoperability test; TLS securityproperties have already been tested and discussed in other fora and areindependent from XKMS.

During the CR period, the WG further refined the two serverimplementation exit criteria to request that there are at least twoservers that are contacted by two or more clients. Likewise, the WGadded an extra criteria requesting that there be at least one clientthat contacts two different servers. The WG felt these refinementsgave a better proof of interoperability.

3. Summary of the Interoperability Tests Results

The Working Group defined a total of 36testscenarios (18 X-KISS, 14 X-KRSS, 1 Compound, 3 Optional). The results aresummarized inAppendix A. Two clients (VM, GA)implemented all the tests. An additional client (TL) implemented reportedsuccess on all the tests, except for the Optional ones as ourreporting rules didn't allow for a developer to reportresults against his own server. Two servers (TL, SQL Data) supported all thetests except for the Optional ones. Only one server (TL ) supported theOptional tests. Both servers were tested against two clients at least. Thesetests satisfy the interoperability entrance criteria to ProposedRecommendation.Appendix A gives a breakdown of thetests.

3.1 Outstanding Interoperability Issues

The Working Group received a total of 43issues. Allbut three suggested changes to the XKMS specification which wereaccepted by the WG (see the Changelog of theXKMSspecification and itsbindings).

The Working GroupG declined the following three issues, the first two as beingdeliberately not addressed and the third one as being out of scope ofthe specification. All the reviewers agreed to the Working Groups responses:

3.2 Success Stories

The Environmental Information Exchange Network (EIEN)of the United States is in aprocess of deploying aliveXKMS 2.0 service. It will go live in a couple of months. The ExchangeNetwork is a web service network that links information systems in the stategovernments and federal government agencies, and allows automated and securedata exchanges between Network Node (the service endpoint). The projectstarted about 3 years ago, currently there are 32 states participating inlive data exchanges, many more are in the development and testing stage. Thegoal is to have all 50 states to join the Exchange Network. It is perhaps thelargest web service network in the US.

The Exchange Network has a centralized security service - NetworkAuthentication and Authorization Services (NAAS), the idea is to have a liveXKMS service and move toward public key authentication with signedauthentication messages, at least between Network Nodes:

  1. Users generate a pair of keys and register them in the central XKMS service (there is an approval process, off course).
  2. Users construct an Authenticate message and sign the message using a registered key, the KeyInfo element will contain a unique key name.
  3. When an authentication message is received, NAAS will validate the key through the XKMS XKISS, and verify the signature. The user is considered authenticated if both the key and authentication message are valid.

3.3 Advisory Interoperability Data

Two of the interoperability participants prepared and contributed a set of XKMS messages that were exchanged during the XKMS CR interoperability phase.These messages are to be seen as advisory, rather than normative.

Appendix A: InteroperabilityResults Matrix

How the table was constructed

XKMS client developers were asked to report their success or failure ofrunning the tests described in the theXKMSAssertions and Test Collection document against a number of XKMS serversusing an onlinequestionnaire,that was open from 2004-09-14 to 2005-01-28 (you need to have a W3C member or public password in order to browse that link). The following table is a summaryof thequestionnaireresults from the point of view of the entrance criteria. Only the clientsand servers that were reported as succesful in the XKMS CR test suite reportwere taken into account. Some developers built both client and servers. Inthose cases, only the tests of those clients against other servers were takeninto account.

The following information was reported directly by the developers.It does not necessarily represent the latest state of any givenimplementation over this or later specifications.

X-KISS

The WG defined 18 tests. These tests and their results satisfy theREQUIRED entrance criteria as stated above: at least two client and twoserver implementations of each feature; for each feature, at least twoservers contacted by at least two different clients; there should be at leastone client that contacts two different servers.

We had four server implementations, of which two (TL, SQL) implemented allthe tests and were contacted by at least two different clients each. We hadup to seven client implementations of which three implemented all the tests(TL, GA, VM).

testserver

implementations

client

implementations

at least two servers contacted by at least two clients

at least one client contacts at least two serverscomments
XKISS-T1: Locate3

TL Server, SQL Data, ASF-XKMS

5

BL, VM, YZ, TL, GA

yesyes
XKISS-T2: Validate4

TL Server, Entrust, SQL Data, ASK-XKMS

7yesyes
XKISS-T3: Locate - not found3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T4: Validate an expired cert4

TL Server, Entrust, SQL Data, ASF-XKMS

6

RL, BL, YZ, VM, TL, GA

yesyes
XKISS-T5: Validate a revoked cert4

TL Server, Entrust, SQL Data, ASF-XKMS

6

RL, BL, YZ, VM, TL, GA

yesyes
XKISS-T6: Two Phase

3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T7: Asynchronous3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T8: Two Phase + Asynchronous3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T9: Compound3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T10: Two Phase Compound3

TL Server, SQL Data, ASF-XKMS

5

BL. YZ, VM, TL, GA

yesyesBL's self-test answer ignored.
XKISS-T11: Asynchronous Compound2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKISS-T12: Compound with inner asynchronous requests2

TL Server, SQL Data

3

VM, TL, GA

yesyes
XKISS-T13: Soap 1.14

TL Server, Entrust, SQL Data, ASF-XKMS

6

BL, RS, YZ, VM, TL, GA

yesyesTL: Used T2 for Entrust,, but not important as we were testing the Soap 1.1 bindings.
XKISS-T14: Soap 1.23

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T15: Opaque Client Data3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
XKISS-T16: Request Signature Value3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes
KISS-T17: Unsuccessful Request Signature Value3

TL Server, SQL Data, ASF-XKMS

4

BL, VM, TL, GA

yesyes
XKISS-T18: Response Limit3

TL Server, SQL Data, ASF-XKMS

5

BL, YZ, VM, TL, GA

yesyes

X-KRSS

The WG defined 14 tests. These tests and their results satisfy theREQUIRED entrance criteria as stated above: at least two client and twoserver implementations of each feature; for each feature, at least twoservers contacted by at least two different clients; there should be at leastone client that contacts two different servers.

We had two server implementations (TL, SQL); both of them implemented allthe tests and were contacted by at least two different clients each. We hadup to four client implementations of which three implemented all the tests(TL, GA, VM). The remaining client implemented all the tests except for one(XKRSS-T13).

testserver

implementations

client

implementations

at least two servers contacted by at least two clientsat least one client contacts at least two serverscomments
XKRSS-T1: Register Client Generated Key2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T2: Register Service Generated Key2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T3: Reissue2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T4: Recover2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T5: Revoke2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T6: Revoke with shared secret2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T7: Two Phase2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T8: Asynchronous2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T9: Asynchronous + Two Phase2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T10: Compound2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T11: Two Phase Compound2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T12: Asynchronous Compound2

TL Server, SQL Data

4

YZ, VM, TL, GA

yesyes
XKRSS-T13: Compound with inner asynchronous requests2

TL Server, SQL Data

3 VM, TL, GAyesyesVM reported a different behavior on SQL Data, hut this is without incidence on th entrance criteria.
XKRSS-T14: Unsuccessful authorization2

TL Server, SQL Data

4

YZ, VM, TL, GA

yes

yes

COMPOUND

The WG defined one test. This test and its result satisfy the REQUIREDentrance criteria as stated above: at least two client and two serverimplementations of each feature; for each feature, at least two serverscontacted by at least two different clients; there should be at least oneclient that contacts two different servers.

Two servers (TL, SQL) and three clients (VM, TL, GA) implemented thetests.

testserver

implementations

client

implementations

at least two servers contacted by at least two clientsat least one client contacts at least two serverscomments
Compound-T1: XKISS and XKRSS2

TL Server, SQL Data

3 VM, TL, GAyesyes

OPTIONAL

The WG defined three tests. These tests and their results satisfy theOPTIONAL entrance criteria as stated above: at least one client and oneserver implementations of each feature.

One server (TL) and two clients (VM, GA) implemented all the tests.

testserver

implementations

client

implementations

two client requests

to each server

a client contacts

at least two servers

comments
Optional-T1: Authentication with Private Key1

TL Server

2 VM, GAyesno
Optional-T2: Authentication with NotBoundAuthentication1

TL Server

2 VM, GAyesno
Optional-T3: Validate with RetrievalMethod1

TL Server

2 VM, GAnono


Jose Kahan
[8]ページ先頭

©2009-2025 Movatter.jp