23.11.2012 Views

BSI Technical Guideline 03125 Annex TR-ESOR-F Formats and ...

BSI Technical Guideline 03125 Annex TR-ESOR-F Formats and ...

BSI Technical Guideline 03125 Annex TR-ESOR-F Formats and ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>BSI</strong> <strong>Technical</strong> <strong>Guideline</strong> <strong>03125</strong><br />

Preservation of Evidence of Cryptographically Signed<br />

Documents<br />

<strong>Annex</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Designation <strong>Formats</strong> <strong>and</strong> Protocols<br />

Abbreviation <strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Version 1.1.<br />

Date 18.02.2011<br />

Parts of the document are not barrier free.


Preservation of Evidence of Cryptographically Signed Documents (<strong>TR</strong>-<strong>ESOR</strong>) <strong>BSI</strong> <strong>TR</strong> <strong>03125</strong><br />

Federal Office for Information Security<br />

Post Box 20 03 63<br />

53133 Bonn<br />

Phone: +49 228 99 9582-0<br />

E-Mail: digsig@bsi.bund.de<br />

Internet: http://www.bsi.bund.de<br />

© Federal Office for Information Security 2011<br />

Federal Office for Information Security


<strong>TR</strong>-<strong>ESOR</strong>-F<br />

Table of Contents<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

1. Introduction........................................................................................................................................5<br />

2. Overview............................................................................................................................................7<br />

3. Definition of the Archival Information Package (XAIP)....................................................................9<br />

3.1 Overview of the XAIP Data Structure..........................................................................................9<br />

3.2 The Package Header (packageHeader).......................................................................................10<br />

3.3 The Metadata Section (metaDataSection)...................................................................................14<br />

3.4 The Data Object Section (dataObjectsSection)...........................................................................15<br />

3.5 The Credentials Section (credentialsSection)..............................................................................16<br />

3.6 Realisation of the XAIP Data Structure in XML........................................................................21<br />

3.6.1 Overview of the XAIP container..........................................................................................22<br />

3.6.2 The Archival Information Package Header (xaip:packageHeader)......................................22<br />

3.6.3 The Metadata Section (xaip:metaDataSection)....................................................................24<br />

3.6.4 The Content Data Section (xaip:dataObjectsSection)..........................................................25<br />

3.6.5 The Credentials Section (xaip:credentialsSection)...............................................................26<br />

3.6.6 Sample realisation of the XAIP data structures on the basis of XFDU................................32<br />

3.6.7 Fundamentals of XFDU.......................................................................................................32<br />

3.6.8 Realisation of an XAIP with XFDU.....................................................................................39<br />

4. Payload data formats........................................................................................................................43<br />

4.1 Metadata.....................................................................................................................................43<br />

4.1.1 Extensible Markup Language (XML)..................................................................................43<br />

4.1.2 XML Schema (XSD)...........................................................................................................44<br />

4.2 Content Data (Object Data)........................................................................................................44<br />

4.2.1 Documents (Records)..........................................................................................................45<br />

4.2.2 Multi-Media <strong>Formats</strong>...........................................................................................................50<br />

4.3 Base64 coding............................................................................................................................53<br />

5. Cryptographic data formats..............................................................................................................55<br />

5.1 Signature formats........................................................................................................................55<br />

5.1.1 PKCS#7 / CMS / CAdES.....................................................................................................55<br />

5.1.2 XML Signatures / XAdES...................................................................................................56<br />

5.2 Certificate formats......................................................................................................................56<br />

5.3 Certificate Validation <strong>Formats</strong>....................................................................................................57<br />

5.3.1 Online Certificate Status Protocol (OCSP / RFC 2560).......................................................57<br />

5.3.2 Server-Based Certificate Validation Protocol (SCVP / RFC 5055)......................................57<br />

5.4 Time Stamp.................................................................................................................................58<br />

5.5 Evidence Record).......................................................................................................................58<br />

Federal Office for Information Security 3


Preservation of Evidence of Cryptographically Signed Documents (<strong>TR</strong>-<strong>ESOR</strong>) <strong>BSI</strong> <strong>TR</strong> <strong>03125</strong><br />

6. Definition of a reliable transaction rrotocol......................................................................................61<br />

6.1 Derived Requirements................................................................................................................61<br />

6.2 Recommendations for the implementation..................................................................................62<br />

7. <strong>Annex</strong> - XML Schema Definition.....................................................................................................64<br />

4 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

1. Introduction<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The goal of the <strong>Technical</strong> <strong>Guideline</strong> “Preservation of Evidence of Cryptographically Signed Documents”<br />

is to specify technical security requirements for the long-term preservation of evidence of<br />

cryptographically signed electronic documents <strong>and</strong> data along with associated electronic administrative<br />

data (meta data).<br />

A Middleware defined for this purpose (<strong>TR</strong>-<strong>ESOR</strong>-Middleware) in the sense of this <strong>Guideline</strong><br />

includes all of the modules (M) <strong>and</strong> interfaces (S) [for the German "Schnittstellen"] used for securing<br />

<strong>and</strong> preserving the authenticity <strong>and</strong> proving the integrity of the stored documents <strong>and</strong> data.<br />

The Reference Architecture introduced in the Main Document of this <strong>Technical</strong> <strong>Guideline</strong> consists of<br />

the functions <strong>and</strong> logical units described in the following:<br />

• The input interface S.4 of the <strong>TR</strong>-<strong>ESOR</strong>-Middleware serves to embed the <strong>TR</strong>-<strong>ESOR</strong>-<br />

Middleware in the existing IT <strong>and</strong> infrastructure l<strong>and</strong>scape;<br />

• The central Middleware module M.1, which regulates the flow of information in the<br />

Middleware, that implements the security requirements for the interfaces with the IT<br />

applications <strong>and</strong> which ensures that the application systems are decoupled from the<br />

ECM/long-term storage;<br />

• The “Cryptographic" module M.2 <strong>and</strong> the associated interfaces S.1 <strong>and</strong> S.3 that provide the<br />

functions needed for the creation (optional) <strong>and</strong> verification of electronic signatures, the postverification<br />

of electronic certificates, <strong>and</strong> for the obtainment of qualified time stamps for the<br />

Middleware. Furthermore, it can provide the functions for the encryption <strong>and</strong> decryption of<br />

data <strong>and</strong> documents;<br />

• The “ArchiSig” module (<strong>TR</strong>-<strong>ESOR</strong>-M.3) with the interface S.6 that provides the functions<br />

needed for the preservation of evidence of the digitally signed documents;<br />

• An ECM/long-term storage with the interfaces S.2 <strong>and</strong> S.5 that assumes the physical<br />

archiving/storage <strong>and</strong> also the storage of the meta data that preserve evidence.<br />

This ECM/long-term storage is no longer directly a part of the <strong>Technical</strong> <strong>Guideline</strong>, but<br />

requirements will be made of it through the two interfaces that are still part of the <strong>TR</strong>-<strong>ESOR</strong>-<br />

Middleware.<br />

The application layer that can include an XML-adapter is not a direct part of this <strong>Technical</strong><br />

<strong>Guideline</strong>, either, even though this XML-adapter can be implemented as part of a Middleware.<br />

The IT Reference Architecture depicted in Figure 1 is based on the ArchiSafe 1 Reference Architecture<br />

<strong>and</strong> is supposed to make possible <strong>and</strong> support the logical (functional) interoperability of future<br />

products with the goals <strong>and</strong> requirements of the <strong>Technical</strong> <strong>Guideline</strong>.<br />

1 For more information, see http://www.archisafe.de .<br />

Federal Office for Information Security 5


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Application -<br />

Layer<br />

<strong>TR</strong>-<strong>ESOR</strong>-<br />

Middleware<br />

Figure 1: Schematic Depiction of the IT Reference Architecture<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Application ... Application ... Application ... Application<br />

Crypto-Interface (<strong>TR</strong>-S.1 / <strong>TR</strong>-S.3)<br />

Crypto-Module<br />

(<strong>TR</strong>-M.2)<br />

XML-Adaptor<br />

ArchiSafe-Interface (<strong>TR</strong>-S.4)<br />

ArchiSafe-Module (<strong>TR</strong>-M.1)<br />

ArchiSig-Interface (<strong>TR</strong>-S.6)<br />

ArchiSig-Module (<strong>TR</strong>-M.3)<br />

<strong>TR</strong>-S.2 <strong>TR</strong>-S.5<br />

ECM-/Storage-Interface<br />

ECM/long-term storage<br />

This <strong>Technical</strong> <strong>Guideline</strong> is modularly structured, <strong>and</strong> the individual annexes to the Main Document<br />

specify the functional <strong>and</strong> technological security requirements for the needed IT components <strong>and</strong> interfaces<br />

of the <strong>TR</strong>-<strong>ESOR</strong>-Middleware. The specifications are strictly platform, product, <strong>and</strong> manufacturer<br />

independent.<br />

The document at h<strong>and</strong> bears the designation “<strong>Annex</strong> <strong>TR</strong>-<strong>ESOR</strong>-F” <strong>and</strong> specifies data formats <strong>and</strong> protocols<br />

that are suitable for the preservation of evidence of cryptographically signed documents from<br />

the perspective of the functional <strong>and</strong> legal requirements.<br />

6 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

2. Overview<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The goal of the storage of electronic data with preservation of evidence over long periods of time is<br />

the provable, authentic, i.e. attributable <strong>and</strong> intact saving, conservation, <strong>and</strong> availability of electronic<br />

data <strong>and</strong> meta data at least of the duration of the legally prescribed retention periods. In doing so<br />

guarantying the negotiability is part of securing the availability of electronic documents, i.e. the<br />

readability <strong>and</strong> context of the data <strong>and</strong> context of the data <strong>and</strong> meta data with the transactions at their<br />

basis over long periods of time using the IT systems typical at the time they are made available.<br />

As a rule, the contents of electronic data <strong>and</strong> documents are coded as a stream (sequence) of characters<br />

of a finite set of characters Z1 by IT systems at the application level. The meta data are also coded as a<br />

sequence of the character set Z2. The sets of characters Z1 <strong>and</strong> Z2 can be the same, but they do not have<br />

to be. Furthermore, the meta data satisfy certain syntactic <strong>and</strong> semantic rules that are founded in the<br />

specifications of the meta data sets.<br />

The associated meta data can be divided into two categories:<br />

• A set of meta data M1 includes information about the set of characters Z1 used to code the<br />

documents <strong>and</strong> thus includes information regarding the display <strong>and</strong> formatting of the actual<br />

contents of the data.<br />

• A set of meta data M2 includes additional descriptive meta data regarding the digital<br />

documents (e.g. creator, date, file reference number, etc.) <strong>and</strong> thus can ensure, for example,<br />

that the documents or data can be found again <strong>and</strong> assigned to a transaction.<br />

Therefore, the goal of the storage of electronic documents with preservation of evidence is to guaranty<br />

for the digital contents, their meta data, <strong>and</strong> character sets<br />

• the authenticity (from which the non-repudiation follows),<br />

• the integrity (intactness), <strong>and</strong> the<br />

• availability<br />

for long periods of time, but at least as long, though, as the period of the statutory retention periods.<br />

The prerequisite for this are st<strong>and</strong>ardised, reliable, <strong>and</strong> verifiable trusted data infrastructures <strong>and</strong><br />

transactions for the electronic documents to be preserved.<br />

In order to ensure the long-term availability of the stored electronic documents, solely open,<br />

st<strong>and</strong>ardised, <strong>and</strong> stable data formats that support a long-term largely system <strong>and</strong> platform independent<br />

interpretation of the data should be used for both the content data <strong>and</strong> the meta data. The primary<br />

intention of this requirement is to avoid a format transformation of the stored electronic documents at<br />

least for the duration of the legally prescribed retention periods, because this is connected to a<br />

significant amount of effort – in particular in the case of electronically signed documents.<br />

In order to prove the integrity <strong>and</strong> authenticity of the data to be preserved, this <strong>Guideline</strong> stipulates the<br />

use of trusted cryptographic security measures that include both the actual content data <strong>and</strong> the<br />

“descriptive” meta data, reliably link them, <strong>and</strong> are able to maintain <strong>and</strong> renew the probative value of<br />

the cryptographic security measures for the duration of the statutory retention periods.<br />

The securing of the authenticity of stored electronic data <strong>and</strong> documents also includes the reliable <strong>and</strong><br />

permanent linking of the stored electronic documents with all meta information that are needed to find<br />

the documents <strong>and</strong> for the legally viable <strong>and</strong> auditable traceability (reconstruction) of the transactions<br />

at the basis of the data.<br />

Federal Office for Information Security 7


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The purpose of this specification is to define <strong>and</strong> describe electronic data formats <strong>and</strong> transaction<br />

protocols that are suitable for adequately mapping <strong>and</strong> executing the legal <strong>and</strong> functional requirements<br />

of long term storage with preservation of evidence in the sense of this <strong>Guideline</strong>.<br />

Thus, Section 3 of this document first describes basic syntactic <strong>and</strong> semantic structures that an<br />

Archival Information Package that conforms to the goals <strong>and</strong> requirements of this <strong>Technical</strong> <strong>Guideline</strong><br />

should implement.<br />

Then, Section 4 of this document describes electronic data formats for the content data (primary data)<br />

<strong>and</strong> the meta data that are recommended primarily with regard to long-term availability <strong>and</strong> automatic<br />

readability <strong>and</strong> interpretability.<br />

Section 5 of this document describes structure, formats, <strong>and</strong> algorithms for the generation <strong>and</strong><br />

interpretation of cryptographic data that are suitable for the long-term securing of the integrity,<br />

authenticity, <strong>and</strong> probative value of electronic documents at the time this <strong>Technical</strong> <strong>Guideline</strong> is<br />

published.<br />

The final Section, 6, dedicates itself to the definition of a trusted transaction protocol from the<br />

perspective of the technically necessary characteristics of such protocols.<br />

The annex to this document contains the definition of a corresponding XML schema for the syntactic<br />

<strong>and</strong> semantic data structures explained in Section 3.<br />

8 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

3. Definition of the Archival Information Package (XAIP)<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

An Archival Information Package, i.e. an electronic document in the sense of this document intended<br />

for long-term storage in an electronic archive system, is a self-explanatory <strong>and</strong> well-formed XML<br />

document that can be verified against a valid <strong>and</strong> authorised XML schema (also called XML<br />

formatted Archival Information Package or XAIP for short in the following).<br />

Such an Archival Information Package contains all content data (primary information) <strong>and</strong> meta<br />

information that are needed for a reliable <strong>and</strong> complete reconstruction of the transaction or<br />

administrative procedures up until the expiry of the legally prescribed retention periods.<br />

The description of Archival Information Packages in a valid XML schema ensures that:<br />

• The Archival Information Packages can be evaluated for syntactic correctness before<br />

submission to the electronic long term storage,<br />

• Necessary additions or augmentations to the meta data can be made by exp<strong>and</strong>ing or<br />

augmenting existing meta data structures <strong>and</strong>/or including additional XML schema, <strong>and</strong><br />

• The cryptographic security measures needed for proving the authenticity <strong>and</strong> integrity of data<br />

subject to the duty of retention on account of legal requirements, such as electronic signatures<br />

or electronic time stamps can be permanently <strong>and</strong> reliably linked to the securing data.<br />

The following sections of this document first describe basic syntactic <strong>and</strong> semantic structures that an<br />

Archival Information Package that conforms to the goals <strong>and</strong> requirements of this <strong>Technical</strong> <strong>Guideline</strong><br />

should implement. They are based in large part on agreements <strong>and</strong> experiences of the ArchiSafe<br />

project of the Physikalisch-Technische Bundesanstalt [PTB 05] <strong>and</strong> concepts of the OAIS reference<br />

model [OAIS], the Metadata Encoding <strong>and</strong> Transmission St<strong>and</strong>ards [METS], the Victorian Electronic<br />

Records Strategy [VERS], <strong>and</strong> the draft of an XML Formatted Data Unit [XFDU] St<strong>and</strong>ard of the<br />

Consultative Committee for Space Data Systems (CCSDS) of NASA.<br />

In the definition <strong>and</strong> description of the XML data structures, these specifications differentiate between<br />

binding (obligatory) <strong>and</strong> optional data elements. A binding data element shall be present in an Archival<br />

Information Package that conforms with these specifications <strong>and</strong> be interpretable by an electronic<br />

archiving system that conforms with this <strong>Guideline</strong>. An optional element can be present. It does not<br />

necessarily have to be interpretable, but it may not hinder the automatic processing (interpretation) of<br />

other elements. An optional element shall be present if its presence is linked to certain conditions, such<br />

as the present of an electronic signature, <strong>and</strong> these conditions have been fulfilled.<br />

3.1 Overview of the XAIP Data Structure<br />

An Archival Information Package pursuant to this <strong>Guideline</strong> should have the following data structure:<br />

• An archive package header (packageHeader) with information about the logical structure(s)<br />

of the XAIP document <strong>and</strong> the sender,<br />

• a data section for meta information for description of the transactional <strong>and</strong> archiving context<br />

of the content data (metaDataSection),<br />

• a data section for the content data (dataObjectsSection), <strong>and</strong><br />

• in the event of the storage of electronically signed documents, a data section for the storage of<br />

signatures, certificates, signature verification information, <strong>and</strong> electronic time stamps<br />

(credentialsSection).<br />

Federal Office for Information Security 9


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

XMLArchivalInformationPackage ::= SEQUENCE {<br />

packageHeader [0]PackageHeader,<br />

metaDataSection [1]MetaDataSection,<br />

dataObjectsSection [2]DataObjectsSection,<br />

credentialsSection [3]CredentialsSection OPTIONAL<br />

}<br />

3.2 The Package Header (packageHeader)<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The package header (packageHeader) of an XAIP document is a complex XML data type <strong>and</strong><br />

should contain information that concerns the entire Archival Information Package. This includes<br />

information about the local structure(s) of the Archival Information Package, <strong>and</strong> administrative<br />

information about the sender of the data to be archived.<br />

The package header contains the following elements:<br />

1. An optional package identifier (packageID) for the Archival Information Package that is<br />

generated by the archiving business application <strong>and</strong> can be used to identify the Archival<br />

Information Package (e.g. within the business application),<br />

2. an AOID element for storing a unique Archival Information Package ID (AOID) generated by<br />

the <strong>TR</strong>-<strong>ESOR</strong>-Middleware or the ECM/long-term storage 2 ,<br />

3. an optional schemaLocation (such as a URL) with information about the version <strong>and</strong> the<br />

name of the syntactic definition of the XML schema at the basis of the Archival Information<br />

Package,<br />

4. an optional packageInfo field with basic information about the Archival Information<br />

Package in text format that makes a future user able to underst<strong>and</strong> the format of the XAIP<br />

document <strong>and</strong> interpret the contents,<br />

5. a sequence of versionManifest elements in which the contents of the various versions of<br />

the Archival Information Package are specified,<br />

6. an optional canonicalization element that refers with an URI to the canonicalization<br />

algorithm 3 with which the XAIP at h<strong>and</strong> was normalised <strong>and</strong> finally<br />

7. an optional extension element that contains additional information if necessary.<br />

2 The archive object ID serves the ability to find the stored documents <strong>and</strong> data in a reliable manner <strong>and</strong> as a<br />

key for the authorised return or deletion of the data.<br />

3 Also see <strong>TR</strong>-<strong>ESOR</strong>-M.3 Chapters 2.4.1 <strong>and</strong> 4.3 <strong>and</strong> <strong>TR</strong>-<strong>ESOR</strong>-M.2 Chapter 4.4<br />

10 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

PackageHeader ::= SEQUENCE {<br />

packageID [0] GeneralName OPTIONAL, -- Packet ID<br />

AOID [1] UTF8String, -- Identifier<br />

schemaLocation [2] GeneralName OPTIONAL, -- XML Schema<br />

packageInfo [3] UTF8String OPTIONAL, -- narrativ Descr.<br />

versionManifests [4] VersionManifests OPTIONAL, -- vers.spec. Table of<br />

content<br />

canonicalization [5] IA5String OPTIONAL, -- canonicalization algo<br />

extension [6] Extension OPTIONAL -- optional extensions<br />

}<br />

The structured data type GeneralName can be used in order to code different forms of names or<br />

identifiers. The suggested structure describes a selection of seven st<strong>and</strong>ard names (identifiers) <strong>and</strong><br />

makes it possible to develop locally defined names or identifiers. The ASN.1 syntax for the<br />

GeneralName data type is defined in [RFC2459]. 4<br />

As a rule, the AOID is a unique identifier for an Archival Information Package generated by the <strong>TR</strong>-<br />

<strong>ESOR</strong>-Middleware or the ECM/long-term storage. This AOID is returned to the requesting application<br />

<strong>and</strong> re-used by it for every additional transaction that concerns the archived information package.<br />

The “version specific table of contents” (VersionManifest) of an XAIP document is a complex data<br />

type structured in the following manner:<br />

VersionManifests ::= SEQUENCE SIZE (1..MAX) OF VersionManifest<br />

VersionManifest ::= SEQUENCE {<br />

versionID [0] GeneralName, -- ID<br />

versionInfo [1] UTF8String OPTIONAL, -- Description<br />

preservationInfo [2] GeneralizedTime OPTIONAL, –- Retention period<br />

submissionInfo [3] SubmissionInfo OPTIONAL, –- Sender information<br />

packageInfoUnits [4] PackageInfoUnits, –- Seq. of Archive Info Units<br />

extension [5] Extension OPTIONAL,-- optional extensions<br />

}<br />

Each VersionManifest contains the following information:<br />

• Obligatory,<br />

an identifier, versionID, for a unique reference to the version of the Archival<br />

Information Package,<br />

• o ptional,<br />

a data element versionInfo for describing the version of the Archival Information<br />

Package,<br />

• o ptional,<br />

a preservationInfo field that should contain the time up to which the Archival<br />

Information Package shall be preserved at a minimum,<br />

• o ptional,<br />

a submissionInfo data type with information about the sender of the Archival<br />

Information Package,<br />

• o bligatory,<br />

a sequence of packageInfoUnit elements that refer to the payload data, meta<br />

data, <strong>and</strong> evidence records belonging to a version of the XAIP, <strong>and</strong> finally<br />

• an optional extension element that contains additional information if necessary.<br />

4 See http://www.ietf.org/rfc/rfc2459.txt<br />

Federal Office for Information Security 11


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

The Extension data type is defined as follows:<br />

Extension ::= SEQUENCE {<br />

extensionType OBJECT IDENTIFIER,<br />

extensionValue [0] ANY DEFINED BY extensionType<br />

}<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The data structure of the submission information (submissionInfo) in the package header is a<br />

complex data type <strong>and</strong> should contain information about the sender of the archival information<br />

packages. This includes the following elements:<br />

• o bligatory,<br />

a multi-client capable identifier unique in the context of a certain <strong>TR</strong>-<strong>ESOR</strong> system<br />

for the transaction application making the request (clientID),<br />

• o ptional,<br />

a unique identification characteristic (identifier) for the submitting organisational<br />

unit (submissionUnit),<br />

• o ptional,<br />

a unique identifier for the author or creator (sender) of the Archival Information<br />

Package,<br />

• o ptional,<br />

indication of the time sent, <strong>and</strong><br />

• o ptional,<br />

a complex data type trackingInfos that can contain information that could be<br />

used to authenticate the communication partners, such as an X.509 v3 certificate [X.509].<br />

SubmissionInfo ::= SEQUENCE {<br />

clientID [0] GeneralName, -- Business Application<br />

submissionUnit [1] GeneralName OPTIONAL, -- Business Unit<br />

submissionAuthor [2] GeneralName OPTIONAL, -- Author<br />

submissionTime [3] TimeInfo OPTIONAL, -- Time of submission<br />

trackingInfos [4] TrackingInfos OPTIONAL -- Authentication information<br />

}<br />

TimeInfo ::= CHOICE {<br />

generalTime GeneralizedTime, -- System time YYYYMMDDHHMMSSZ<br />

timestamp TimeStampToken -- Time stamp according RFC 3161<br />

}<br />

TrackingInfos ::= SEQUENCE SIZE (1..MAX) OF TrackingInfo<br />

TrackingInfo ::= ContentInfo<br />

ContentInfo ::= SEQUENCE {<br />

contentType ContentType,<br />

content EXPLICIT ANY DEFINED BY contentType<br />

}<br />

ContentType ::= OBJECT IDENTIFIER<br />

12 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The “version-specific table of contents" (VersionManifest) contains a sequence of archive-infounits<br />

(PackageInfoUnits), in which case each PackageInfoUnit itself can include one or more<br />

PackageInfoUnits. The logical content of a package info unit is defined by the references<br />

(IDREFs) contained in the PackageInfoUnit element. Furthermore, it is clarified by the sequence of<br />

the protectedObjectPointers which payload data, meta data, <strong>and</strong> evidence record objects must<br />

be included by the Archive Time Stamp.<br />

Regardless of that, additional references from payload data objects to logically associated meta data<br />

<strong>and</strong> evidence records can exist that are not (directly) relevant for the generation <strong>and</strong> maintenance of<br />

the archive time stamp.<br />

PackageInfoUnits ::= SEQUENCE SIZE (1..MAX) OF PackageInfoUnit<br />

PackageInfoUnit ::= SEQUENCE {<br />

packageUnitID [0] GeneralName, -- ID<br />

unitType [1] UTF8String OPTIONAL, -- Classification<br />

textInfo [2] UTF8String OPTIONAL, -- Description<br />

protectedObjectPointers [3] IDREFs OPTIONAL, -- Link to integrityprotected<br />

data, meta data <strong>and</strong> evidence objects<br />

unprotectedObjectPointers [4] IDREFs OPTIONAL, -- Link to not<br />

integrity-protected data, meta data <strong>and</strong> evidence objects<br />

packageInfoUnits [5] PackageInfoUnits OPTIONAL -- additional<br />

archive info units<br />

extension [6] Extension OPTIONAL -- optional extensions<br />

}<br />

Each PackageInfoUnit contains the following information:<br />

• Obligatory,<br />

an identifier, packageUnitID, for a unique reference to the version of the<br />

packageInfoUnit,<br />

• o ptional,<br />

a unitType data element that enables classification of the individual information<br />

packages,<br />

• o ptional,<br />

a textInfo data element, i.e. an additional text field for describing the<br />

packageInfoUnit,<br />

• o ptional,<br />

a protectedObjectPointers data element that contains a sequence of references<br />

(IDREF in XML notation) that contains integrity-protected payload data, meta data, <strong>and</strong><br />

credentials that are assigned to this PackageInfoUnit. The data elements referenced by this<br />

flow into the generation of the hash tree that is protected by an archive time stamp pursuant to<br />

[RFC 4998] or [XMLERS]. Additional information on this can be found in [<strong>TR</strong>-<strong>ESOR</strong>-M.3],<br />

• o ptional,<br />

an unprotectedObjectPointers data element that contains a sequence of<br />

references (IDREF in XML notation) that contains non-integrity-protected payload data, meta<br />

data, <strong>and</strong> evidence records that are assigned to this PackageInfoUnit.<br />

• o ptional,<br />

a PackageInfoUnits elements that, in turn, contains a sequence of<br />

PackageInfoUnit elements. Thus, a hierarchy or structure of the primary information<br />

packages contained in this Archival Information Package can be depicted.<br />

• Furthermore, an optional extension element that contains additional information if<br />

necessary can exist.<br />

Federal Office for Information Security 13


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

The IDREFs structure is defined as follows:<br />

IDREFs ::= SEQUENCE SIZE (1..MAX) OF IDREF<br />

IDREF ::= GeneralName<br />

3.3 The Metadata Section (metaDataSection)<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The meta data section (metaDataSection) of an XAIP document is a complex XML data type <strong>and</strong><br />

shall contain all meta information that is needed for transparent <strong>and</strong> permanent interpretation of the<br />

transaction <strong>and</strong> archiving context for all content information packages summarized (subsumed) in the<br />

Archival Information Package. Multiple meta data packages can be stored in this section, each of<br />

which contains the meta information for a separate content data object stored in the Archival<br />

Information Package (XAIP document). 5<br />

The following structure is recommended for the syntactic structure of the meta data<br />

(metaDataObject):<br />

Each meta data object shall contain a unique reference (identification characteristic) metaDataID of<br />

the concerned meta data section. Furthermore, the meta data object can contain the following<br />

(optional) data elements:<br />

• A classification characteristic classification,<br />

• a categorisation characteristic, category,<br />

• an additional text description (explanation) of the meta data in the textInfo element.<br />

The data elements classification <strong>and</strong> category support the mapping of the OAIS information<br />

module by indicating typing information for the meta data object <strong>and</strong> can also be used for the search<br />

algorithms within the archive system among other things. With such a construction, one can, for<br />

example, also categorise retention periods as "Preservation Description Information (PDI)” <strong>and</strong><br />

classify them with periods <strong>and</strong> other preservation information.<br />

The meta data themselves can be stored in the metaData element either as an XML data element or as<br />

Base64 coded binary data. With the MetaData data type, a reference to the meta data (IDREF) can be<br />

realised that is already contained in the corresponding payload data object in the dataObjectsSection<br />

or a hierarchy of meta data can be mapped. 6<br />

5 This construction makes it possible to adequately map not just complete but also different file <strong>and</strong> index<br />

structures in an XAIP document. The construction makes it possible to use different XML schemata as the<br />

basis for each meta data object.<br />

6 Also see http://tools.ietf.org/html/draft-ietf-ltans-ltap-07.txt<br />

14 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

MetaDataSection ::= SEQUENCE SIZE (1..MAX) OF MetaDataObject<br />

MetaDataObject ::= SEQUENCE {<br />

metaDataID [0] GeneralName, -- Identifier<br />

dataObjectID [1] IDREF, –- Link to payload objects<br />

classification [2] UTF8String OPTIONAL, -- Classification<br />

category [3] UTF8String OPTIONAL, -- Categorisation<br />

textInfo [4] UTF8String OPTIONAL, -- Description<br />

metaData [5] MetaData -- Metadata<br />

}<br />

MetaData ::= SEQUENCE {<br />

type OBJECT IDENTIFIER OPTIONAL,<br />

value [0] EXPLICIT ANY DEFINED BY type<br />

}<br />

3.4 The Data Object Section (dataObjectsSection)<br />

The data object section of an XAIP document, dataObjectsSection, should have the content data<br />

to be archived in the dataObject data structure. In doing so, the data object section can contain any<br />

number of such content data objects. It can be used, for example, to store content data in different data<br />

formats, for example platform or application specific ones, in an XAIP container, or archive entire<br />

folders with many different documents together.<br />

Each of these content data objects should be described by the following data elements:<br />

• Obligatory,<br />

a unique identification characteristic (dataObjectID) for this section,<br />

• o bligatory,<br />

a contentData data element for include of the content data,<br />

• o ptional,<br />

a cryptographic checksum of the content data, <strong>and</strong><br />

• o ptional,<br />

information about any transformations of the payload data object that have been<br />

carried out.<br />

DataObjectSection ::= SEQUENCE SIZE (1..MAX) OF DataObject<br />

DataObject ::= SEQUENCE {<br />

dataObjectID [0] GeneralName -- ID<br />

contentData [1] ContentData, -- Payload<br />

checkSum [2] CheckSum OPTIONAL, -- Checksum<br />

transformInfo [3] TransformInfo OPTIONAL -- Transformation information<br />

}<br />

The contentData element includes the actual content data either as Base64 coded binary data<br />

(binaryData) or as complex data types in XML notation (XMLData).<br />

ContentData ::= CHOICE {<br />

binaryData OCTET S<strong>TR</strong>ING, -- Base64 coded binary data<br />

structured XMLData -- XML data<br />

}<br />

Federal Office for Information Security 15


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Optionally, each content data object can also have a cryptographic checksum (checksum) of the data;<br />

in this case the algorithm data element for the algorithm of the checksum generation shall be<br />

indicated, e.g. SHA-256. The checksum also refers to the payload data as they are present in the XAIP,<br />

thus in particular also taking any transformations that have been performed into account.<br />

CheckSum ::= SEQUENCE {<br />

algorithm GeneralName,<br />

checkSum CheckSumValue<br />

}<br />

CheckSumValue ::= OCTET S<strong>TR</strong>ING 7<br />

The likewise optional data element transformInfo is used in order to document one or more<br />

operations (transformations) performed on the original data before storage in the archive system.<br />

TransformInfo ::= SEQUENCE SIZE (1..MAX) OF TransformObject<br />

TransformObject ::= SEQUENCE {<br />

transformObjectID GeneralName, -- ID<br />

order INTEGER, -- Sequence of Transformations<br />

transformType TransformType, -- Type of Transformation<br />

transformAlgorithm OBJECT IDENTIFIER, -- Transformation algorithm<br />

parameter ANY DEFINED BY transformAlgorithm OPTIONAL<br />

-- additional parameters<br />

}<br />

TransformType ::= ENUMERATED {compressed (0), canonicalization (1), encryption (2),<br />

other (3)}<br />

3.5 The Credentials Section (credentialsSection)<br />

The credentials section serves to accommodate EvidenceRecord elements pursuant to [RFC4998] /<br />

[XMLERS] <strong>and</strong> other supplemental evidence data such as signatures, time stamps, certificates, <strong>and</strong><br />

associated status information for each of the content data objects stored in the XAIP document. 8<br />

The relationship between the Evidence Records or the supplemental evidence data <strong>and</strong> the<br />

corresponding payload or meta data is realised with the relatedObjects attribute of the<br />

7 Realised in the XML schema by the “hexBinary” data type.<br />

8 The Evidence Record serves to prove the intactness of the integrity <strong>and</strong> authenticity of the archived data<br />

objects. In accordance with the specifications of the ERS st<strong>and</strong>ard of IETF, an evidence record includes an<br />

Archive Time Stamp of sufficient quality for the stored (signed) archive data objects that prove the integrity<br />

of the data <strong>and</strong> additional information that prove the correctness <strong>and</strong> validity of electronic signatures at the<br />

time of signing as well as the timely renewal of signature pursuant to the legal requirements. “Supplemental<br />

evidence data” are signatures or time stamps for exactly one data object or document, <strong>and</strong> they also include<br />

the verification data necessary for the signature or time stamp signature, such as certificates as well as the<br />

CRL lists <strong>and</strong> OCSP responses to these certificates. The Evidence Records prove that the document was not<br />

changed after it was archived. The supplemental evidence data prove that the signatures <strong>and</strong> time stamps<br />

which may have been created outside of the archive were valid at the time of creation or archiving.<br />

16 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Credential element explained below. If no evidence record objects are needed in the entire XAIP,<br />

the CredentialsSection can be omitted completely.<br />

CredentialsSection ::= SEQUENCE SIZE (1..MAX) OF Credential<br />

Each (individual) credential object (of the Credential data type) is itself in turn identified by a<br />

unique identifier (name or characteristic), the credentialID.<br />

The type of the credential can be specified using the category data element. The likewise optional<br />

textInfo data element can be used for an additional text description that makes a future user able to<br />

underst<strong>and</strong> the format of the object <strong>and</strong> interpret the contents 9 .<br />

-- Credial section for a single evidence object (e.g. a signature)<br />

Credential ::= SEQUENCE {<br />

credentialID [0] GeneralName, -- ID<br />

relatedObjects [1] IDREFs OPTIONAL –- Link to related<br />

payload, meta data or evidence objects<br />

category [2] UTF8String OPTIONAL, -- Type of Credentials<br />

textInfo [3] UTF8String OPTIONAL, -- Description<br />

credentialData [4] CredentialData, -- evidence related<br />

objects<br />

}<br />

The obligatory CredentialData data type encapsulates the supplemental evidence data specified by<br />

category: Signatures in the SignatureObject data element, time stamps pursuant to [RFC3161]<br />

in the TimeStampToken data element, certificates pursuant to [RFC5280] <strong>and</strong> [RFC3281] in the<br />

CertificateValue data element, references to such certificates in the certificateRefs element,<br />

revocation information pursuant to [RFC5280] in the RevocationValue data element, references to<br />

revocation information in the recovationRefs data element, evidence records in the ERS st<strong>and</strong>ard<br />

format of IETF pursuant to [RFC4998] / [XMLERS] in the EvidenceRecordInfos data element,<br />

information on the validity of evidence records in the verificationReport data element, or other<br />

evidence records in the other data element.<br />

CredentialData ::= CHOICE {<br />

signature SignatureObject, -- Signature data<br />

timestamp TimeStampToken, -- Time stamp [RFC3161]<br />

certificates CertificateValues, -- Certifikate [RFC 3281,5280]<br />

certificateRefs CertificateRefs, –- Links to Certifikate<br />

revocationValues RevocationValues, -- Revocation infos[RFC5280]<br />

revocationRefs RevocationRefs, –- Link to Revocation infos<br />

evidenceRecord EvidenceRecord, -- Evidence Record according<br />

[RFC4998] or [XMLERS]<br />

verificationReport VerificationReport, –- Verification infos<br />

other Extension, -- other evidences<br />

}<br />

9 It is up to the user if he wishes the describe the category of the credential object in more detail within this<br />

field.<br />

Federal Office for Information Security 17


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The SignatureObject data element contains signature data either as CMS/PKCS#7 signatures<br />

[RFC5652] or as XML signatures [XMLDSIG] 10 .<br />

SignatureObject ::= ContentInfo<br />

ContentInfo ::= SEQUENCE {<br />

contentType ContentType,<br />

-- id-signedData OBJECT IDENTIFIER [RFC5652] for CMS/PKCS#7 Signatures,<br />

-- xlmns:ds = “http://www.w3.org/2000/09/xmldsig#” for XML Signatures<br />

content [0]EXPLICIT ANY DEFINED BY contentType<br />

}<br />

NOTICE: The corresponding type definitions for id-signedData <strong>and</strong> signedData are found in<br />

the CMS specification [RFC5652]; the corresponding syntactic <strong>and</strong> semantic definitions for XML<br />

signatures in the W3C Recommendation from 9 January 2009.<br />

For XML <strong>and</strong> XAdES signatures, the <strong>Guideline</strong> recommends that verification information such as<br />

certificates or revocation information be inserted into the XML signature as unsigned characteristics<br />

(also see Chapter 5.1.2 in this document).<br />

The TimeStampToken data element encapsulates time stamp information pursuant to [RFC3161] 11 .<br />

TimeStampToken ::= ContentInfo<br />

-- [RFC3161]<br />

-- contentType is id-signedData ([RFC5652])<br />

-- content is SignedData ([RFC5652])<br />

NOTICE: The TimeStampToken shall not contain any signatures besides the signature of the time<br />

stamp service provider. The supplemental evidence data that goes beyond that shall be saved pursuant<br />

to [CAdES] in unsigned fields of the TimeStampToken. 12<br />

The CertificateValues data element encapsulates X.509 certificates pursuant to [RFC5280] <strong>and</strong><br />

attribute certificates pursuant to [RFC3281] as well as other certificate information.<br />

CertificateValues ::= SEQUENCE (1..MAX) OF CertificateValue<br />

CertificateValue ::= CHOICE {<br />

encapsulatedX509Certificate Certificate, -- [RFC5280]<br />

10 In the XML definition (see <strong>Annex</strong>), data elements of the SignatureObject type are realised on the basis<br />

of OASIS "Digital Signature Service Core Protocols, Elements, <strong>and</strong> Bindings" version 1.0 from 11 April<br />

2007 as a form of dss:SignatureObject (see http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-specv1.0-os.html).<br />

11 In the XML definition the TimeStampToken data element is listed as an option in the general data<br />

structure on the basis of the dss:SignatureObject OASIS "Digital Signature Service Core Protocols,<br />

Elements, <strong>and</strong> Bindings" version 1.0 from 11 April 2007 as a form of dss:SignatureObject (see<br />

http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html).<br />

12 CAdES are preferred to regular CMS signature here because CMS does not expressly stipulate structures<br />

such as CRLs <strong>and</strong> OCSP responses for saving status information on certificates.<br />

18 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

}<br />

otherCerts OtherCertificates<br />

OtherCertificates ::= SEQUENCE {<br />

certType OBJECT IDENTIFIER,<br />

certValue ANY DEFINED BY certType<br />

}<br />

CertificateRefs ::= IDREFs<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The RevocationValues data element contains revocation information on technical evidence<br />

records.<br />

RevocationValues ::= SEQUENCE (1..MAX) OF RevocationValue<br />

RevocationValue ::= SEQUENCE {<br />

crlVals [0] SEQUENCE OF CertificateList OPTIONAL, -- RFC 5280<br />

ocspVals [1] SEQUENCE OF BasicOCSPResponse OPTIONAL, -- RFC 2560<br />

otherVals [2] OtherRevocationValues<br />

}<br />

RevocationRefs ::= IDREFs<br />

A RevocationValue different from a CertificateList or OCSPResponse can be stored in the<br />

OtherRevocationValues structure. This allows to use SCVP responses according to [RFC5055]<br />

for example.<br />

OtherRevocationValues ::= SEQUENCE {<br />

otherRevValType OBJECT IDENTIFIER,<br />

otherRevVals ANY DEFINED BY otherRevValType<br />

}<br />

-- SCVP Certificate Validation Response<br />

id-ct-scvp-certValResponse OBJECT IDENTIFIER ::= { id-ct 11 }<br />

NOTICE: In doing so, it is to be noted that revocation information besides certificate lists or OCSP<br />

answers is hardly supported by any applications at the time this <strong>Technical</strong> <strong>Guideline</strong> is published.<br />

Thus, it is recommended to resolve the original revocation information in the corresponding CRLs or<br />

OCSP responses in such a case.<br />

In the event of migration of the archival information packages into a new archive system, the<br />

CredentialData structure can also be used to store the Evidence Records that belong to the XAIP<br />

document. For doing so, the EvidenceRecord data element pursuant to [RFC4998] / [XMLERS] that<br />

can accommodate multiple reduced archive time stamps for one payload data object is stipulated.<br />

NOTICE: An Archival Information Package (XAIP container) must also be able beyond the original<br />

(first) archiving to depict different versions <strong>and</strong> migrations from one archive to another in a correct<br />

<strong>and</strong> traceable manner. In doing so, the evidence records (ERS entries or the reduced archive time<br />

stamp) that are normally managed separately from the XAIP document also have to be taken into<br />

account along with the XAIP container.<br />

Federal Office for Information Security 19


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

In the event that a new version of an XAIP container is created, a new, version-specific manifest is<br />

added to the header that defines the integrity <strong>and</strong> non-integrity protected content of the new version.<br />

Details on versioning can be found in [<strong>TR</strong>-<strong>ESOR</strong>-M.3].<br />

In the event of a migration, the old XAIP container can be nested in a new XAIP container as a<br />

payload data object. The difference in version creation here is that the entire reduced hash tree is<br />

stored in the credentialsSection of the new XAIP container as a Crendential in the form of an<br />

evidence record.<br />

The definition of the EvidenceRecord data type can be found in [RFC4998] in Chapter 5.5 <strong>and</strong> in<br />

the Main Document of this <strong>Technical</strong> <strong>Guideline</strong> [<strong>TR</strong>-<strong>ESOR</strong>].<br />

The optional CredentialValidity data element in the Credential element serves the<br />

depositing of additional validity or verification information that may be requested for individual<br />

CredentialData insofar as they could or should not be added as unsigned attributes to the<br />

signature or time stamp data – as stipulated in [CAdES] or [XAdES] – or were already stored in the<br />

CredentialData data structure.<br />

CredentialValidity ::= SEQUENCE {<br />

validityInfoType OBJECT IDENTIFIER,<br />

-- id-pkix-ocsp-response OBJECT IDENTIFIER ::= {id-pkix-ocsp 4}:OCSCP<br />

-- id-ct-scvp-certValResponse OBJECT IDENTIFIER ::= { id-ct 11 }:SCVP<br />

-- urn:oasis:name:tc:dss:1.0:profiles:verficationreport:schema#:OASIS-VR<br />

validityInfoValue ANY DEFINED BY validityInfoType<br />

}<br />

Based on the validityInfoType, the verification results (ValidityInfoValue) for<br />

signatures, time stamp, or certificates that are not already part of a signature are stored as<br />

OCSPResponse pursuant to [RFC2560], as SCVPResponse pursuant to [RFC5055], or as<br />

individual verification reports pursuant to [OASIS-VR].<br />

ValidityInfoValue is stipulated as the general vr:IndividualReport data type on the<br />

basis of the OASIS profile [OASIS-VR] <strong>and</strong> can arise in the following specifications (also see Chapter<br />

3.6):<br />

• As a DetailedSignatureReport for the verification of electronic signatures,<br />

• as an IndividualTimeStampReport for the verification of individual time stamps<br />

pursuant to [RFC3161] that are not already part of a signature,<br />

• as an IndividualCertificateReport for public key certificates pursuant to<br />

[RFC5280] that are not already part of a signature,<br />

• as an IndividualAttributeCertificateReport for attribute certificates pursuant<br />

to [RFC3281] that are not already part of a signature,<br />

• as an IndividualCRLCertificateReport for revocation lists pursuant to [RFC5280]<br />

that are not already part of a signature,<br />

• as an IndividualOCSPReport for OCSP responses pursuant to [RFC5280] that are not<br />

already part of a signature or<br />

20 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

• as an EvidenceRecordReport for evidence records pursuant to [RFC4998] or<br />

[XMLERS].<br />

There is detailed information on the data formats for signatures, time stamps, <strong>and</strong> certificate<br />

verification information that are recommended by this <strong>Guideline</strong> in Chapter 5.<br />

3.6 Realisation of the XAIP Data Structure in XML<br />

The following section describes the realisation of the XAIP data structure in XML notation.<br />

(A3.6-1) For the preservation of evidence of cryptographically signed documents the XAIP-format<br />

described in this section <strong>and</strong> specified by the corresponding XML-schema should be used. Deviations<br />

from this XML-format are possible, but in this case it must be explained that equal functionality is<br />

provided. In particular it must be explained how a transformation to the present XAIP-format is<br />

possible.<br />

The documentation of the complete XML schema can be found in the annex to this document. Because<br />

simple mapping to the ASN.1 specifications of the XAIP container in the previous chapter is possible<br />

in most cases on account of the same names, this chapter does not describe the individual data<br />

elements in detail. XML conventions <strong>and</strong> st<strong>and</strong>ards, such as OASIS DSS <strong>and</strong> XAdES, were given<br />

priority when translating the ASN.1-based data types to XML. It is recommended for the necessary<br />

resolving of structures declared in the XAIP schema by means of XML namespaces in the case of an<br />

automatic validation of an XML document that the associated schema definitions be deposited<br />

together with the XAIP schema described in the annex in the access of the validator.<br />

Notice: The following figures were mapped with XML Viewer Eclipse 3.1. For reasons of clarity the<br />

attributes are not depicted. An (a) inside of a circle in the mapped data elements refers to the existence<br />

of additional attributes in the respective data structure.<br />

Federal Office for Information Security 21


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

3.6.1 Overview of the XAIP container<br />

Figure 2: Overview of the XAIP container<br />

As explained in Section 3.1, an XAIP document contains (also see Figure 2):<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

• An Archival Information Package header (xaip:packageHeader) with information about<br />

the logical structure(s) of the XAIP document,<br />

• a section of data for the meta information for describing the transaction <strong>and</strong> archiving context<br />

of the content data (xaip:metaDataSection),<br />

• a data section for the content data, (xaip:dataObjectsSection), <strong>and</strong><br />

• in the case of the preservation of electronically signed documents, a data section<br />

(xaip:credentialsSection) for the depositing of cryptographic evidence records <strong>and</strong><br />

supplemental evidence data.<br />

The respective elements of the XAIPType are optional so that all kinds of different applications can be<br />

supported.<br />

3.6.2 The Archival Information Package Header (xaip:packageHeader)<br />

As explained in section 3.2, the package header includes information about the logical structure(s) of<br />

the Archival Information Package <strong>and</strong> administrative information about the sender of the data to be<br />

archived.<br />

22 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

This includes, in addition to the Archival Information Package ID (AOID) 13 <strong>and</strong> information about the<br />

XML schema at the basis of the archival information container (xaip:schemaLocation), textual<br />

information about the Archival Information Package (xaip:packageInfo), “version-specific<br />

manifests” with information about the logical design <strong>and</strong> structure of a certain version of the archival<br />

information (xaip:versionManifest, also see Section 3.2 <strong>and</strong> Figure 3), <strong>and</strong> an optional 14<br />

canonicalization method (ds:CanonicalizationMethod) with which all XML based data<br />

structures of the XAIP shall be normalised before hash value generation, <strong>and</strong>, finally, optional<br />

extension (xaip:extension).<br />

Figure 3: Overview of the Package Header<br />

The “version-specific manifest” (xaip:versionManifest) of an XAIP document can – as described<br />

already in Section 3.2 – contain, in addition to the version information, a text version-specific<br />

information (xaip:versionInfo), a retention period (xaip:preservationInfo), information on<br />

the sender of the Archival Information Package (xaip:submissionInfo), <strong>and</strong> a sequence of<br />

xaip:packageInfoUnit‘s (“chapters”).<br />

13 The Archival Information Package ID (AOID) serves the ability to find the stored documents <strong>and</strong> data in a<br />

reliable manner <strong>and</strong>, if applicable, as an authentication characteristic for the return or deletion of the data.<br />

14 Insofar as this element is not present, the canonicalization is done with the st<strong>and</strong>ard algorithm (C14N -<br />

Canonical XML [C14N]). Additional information on canonicalization can also be found in <strong>TR</strong>-<strong>ESOR</strong>-M.2,<br />

Chapter 4.4.<br />

Federal Office for Information Security 23


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 4: Overview of a packageInfoUnit<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Such a xaip:packageInfoUnit can, in turn, contain type information (xaip:unitType), a text<br />

description (xaip:textinfo), a sequence of references to integrity protected<br />

(xaip:protectedObjectPointer), <strong>and</strong> non-integrity-protected payload data, meta data, <strong>and</strong><br />

credential objects (xaip:unprotectedObjectPointer) that are assigned to this<br />

PackageInfoUnit <strong>and</strong>, in turn, an additional sequence of xaip:packageInfoUnit elements 15 <strong>and</strong>,<br />

finally, additional information in the xaip:extension element (also see Section 3.2 <strong>and</strong> Figure 4<br />

with regard to this).<br />

3.6.3 The Metadata Section (xaip:metaDataSection)<br />

As explained in Section 3.3, the meta data section (xaip:metaDataSection) of an XAIP<br />

document contains all meta information that supports the underst<strong>and</strong>ing of the transaction <strong>and</strong><br />

archiving context of the content data objects summarized in an Archival Information Package.<br />

Multiple meta data objects of the xaip:metaDataObject type can of course also be stored in this<br />

section, each of which contains the meta information for a content data package stored in an Archival<br />

Information Package (XAIP document) (see Figure 5).<br />

15 Thus, a hierarchy or structure of the content data contained in the Archival Information Package can be<br />

depicted.<br />

24 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Each meta data object contains a unique reference (identification characteristic) of the concerned meta<br />

data section medaDataID. Then, optional data elements follow that allow classification,<br />

categorisation, <strong>and</strong>/or description of the meta data object (also see Section 3.3).<br />

The meta data themselves are be deposited in the xaip:metaData element either as an XML-based<br />

data element or as Base64 coded binary data.<br />

Figure 5: Overview of the metaDataSection<br />

3.6.4 The Content Data Section (xaip:dataObjectsSection)<br />

As already explained in Section 3.4, the data object section of an XAIP document<br />

(xaip:dataObjectsSection) serves to accommodate the content data to be archived in one or<br />

more data structures of the xaip:dataObject type (also see Figure 6). This can, as described in<br />

Section 3.4, be used, for example, to store content data in different or platform <strong>and</strong> application specific<br />

data formats in an XAIP container.<br />

Figure 6: Overview of the dataObjectsSection<br />

The xaip:dataObject element encapsulates the actual content data, either as Base64 coded<br />

binary data or as complex data types in XML notation. Optionally, a cryptographic checksum<br />

Federal Office for Information Security 25


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

(xaip:CheckSum) about the payload data <strong>and</strong> information about any operations (transformations)<br />

executed on the original data can be added to each content data object.<br />

Figure 7: Transformation information<br />

The information about the individual operations (transformations) can be deposited in a sequence of<br />

one or more transformation objects (xaip:tranformObject). A transformation object is<br />

identified by an ID, then an indication of the sequence of the operation, the operations type, <strong>and</strong> the<br />

associated operations algorithm <strong>and</strong> any necessary parameters follow (also see Figure 7).<br />

3.6.5 The Credentials Section (xaip:credentialsSection)<br />

As explained already in Section 3.5, the credentials section serves to deposit Evidence Records <strong>and</strong><br />

supplementary evidence data such as signatures, time stamps, certificates, <strong>and</strong> status information<br />

(validity information) on the credentials contained in the XAIP document.<br />

Figure 8: Overview of the CredentialsSection Data Structure<br />

As shown in Figure 8, the xaip:credentialsSection consists of a sequence of<br />

xaip:credential elements.<br />

Such a credential object (xaip:credential) contains two attributes (relatedObjects <strong>and</strong><br />

credentialID) with which the relationships between a credentials object <strong>and</strong> the associated payload<br />

or meta data objects or other Evidence Record objects is documented. The relatedObjects attribute<br />

is of the xs:IDREFs type <strong>and</strong> contains references to other payload data, meta data, or evidence record<br />

objects. The credential attribute is of the xs:ID type <strong>and</strong> makes it possible for a different evidence<br />

record object or a "version specific manifest” (xaip:versionManifest) to refer to the concerned<br />

credential object.<br />

26 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The data structure depicted in Figure 9, xaip:credential may contain the following objects:<br />

• Signatures (CMS/PKCS#7 signatures [RFC3852] or XML signatures [XMLDSIG]) in the<br />

dss:SignatureObject data element of the OASIS “Digital Signature Service Core<br />

Protocols, Elements, <strong>and</strong> Bindings” version 1.0 from 11 April 2007 16 ,<br />

• time stamps pursuant to [RFC3161] in the dss:Timestamp element of the OASIS „Digital<br />

Signature Service Core Protocols, Elements, <strong>and</strong> Bindings“ Version 1.0 from 11 April 2007 in<br />

as the specification of the dss:SignatureObject.<br />

• certificates pursuant to [RFC5280] <strong>and</strong> [RFC3281] in the xaip:certificateValues<br />

data element,<br />

• references to certificates in the xaip:certificateRefs data element,<br />

• revocation information pursuant to [RFC5280] in the xaip:revocationValues data<br />

element,<br />

• references to revocation information in the xaip:revocationRefs data element,<br />

• Evidence Records in the ERS st<strong>and</strong>ard format of the IETF pursuant to [RFC4998] or the<br />

XML based variation pursuant to [XMLERS] in the xaip:evidenceRecord data element,<br />

• a verification report for a credential object (vr:VerificationReport), or<br />

• other supplemental evidence data in the xaip:other data element.<br />

16 See: http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html<br />

Federal Office for Information Security 27


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 9: Overview of the credential 17 data structure<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Certificates can be deposited as supplemental evidence data in the xaip:certificateValue data<br />

element, validity information for the certificates (revocation lists or OCSP responses) can be deposited<br />

in the xaip:revocationValue data element (also see Figure 10).<br />

17 Executed on the basis of the OASIS "Digital Signature Service Core Protocols, Elements, <strong>and</strong> Bindings“<br />

version 1.0 from 11 April 2007. See: http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html.<br />

28 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Figure 10: Signature objects <strong>and</strong> certificate information stored as Evidence Records<br />

Federal Office for Information Security 29


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 11: Revocation information stored as credential<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

NOTICE: The OCSP protocol cannot replace CRLs <strong>and</strong> other revocation technologies in every case.<br />

The OCSP responder retrieves the status information if applicable from CRLs, from another<br />

(additional) OSCP responder, a database, or another source of information. The advantage of a<br />

protocol compared to CRLs is that only the status information on the respective certificates that are<br />

requested has to be transmitted <strong>and</strong> stored. In contrast, a CRL contains a great deal of revocation<br />

information that is useless for the inquiry, <strong>and</strong> a CRL does not provide any proof that a certificate was<br />

ever issued.<br />

The xaip:ersInfo data structure serves to deposit the Archive Time Stamps pursuant to<br />

[RFC4998] belonging to an Archival Information Package that have to be included in a new archive<br />

system in the event of a migration <strong>and</strong>, in doing so, have to be embedded into the “migrated” XAIP<br />

container. Optionally, the Archival Information Package ID (AOID) can also be deposited for each<br />

evidence record.<br />

30 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 12: The evidenceRecord data structure<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Two possibilities are stipulated for the storing of an Evidence Record pursuant to [RFC4998] /<br />

[XMLERS] in the xaip:evidenceRecord data element. One is on the basis of the XML<br />

specification [XMLERS] <strong>and</strong> the other is as Base64 coded binary data on the basis of the ASN.1<br />

specifications published in [RFC4998].<br />

The vr:VerificationReport data element in the xaip:credential data structure (also see<br />

Figure 9) serves for storing additional validity or verification information that may be requested for<br />

individual xaip:credential insofar as they can or should not be added as unsigned attributes to the<br />

signature or time stamp data – as stipulated in [CAdES] or [XAdES] – or were already deposited in the<br />

xaip:credential data structure.<br />

In vr:VerificationReport, the verification results for technical evidence records <strong>and</strong> other<br />

supplementary evidence data (e.g. signatures, time stamps, certificates, <strong>and</strong> revocation information<br />

that is not already a part of the signature) can be stored in the form of verification reports pursuant to<br />

the OASIS "Profile for comprehensive multi-signature verification reports for OASIS Digital<br />

Signature Services“ [OASIS-VR].<br />

The CredentialValidity is of the vr:IndividualReport data type (see [OASIS-VR]) <strong>and</strong><br />

can include the following elements in the optional Details element (also see Chapter 3.5):<br />

• A DetailedSignatureReport for the verification of electronic signatures,<br />

• an IndividualTimeStampReport for the verification of individual time stamps<br />

pursuant to [RFC3161] that are not already part of a signature,<br />

• an IndividualCertificateReport for public key certificates pursuant to [RFC5280]<br />

that are not already part of a signature,<br />

• an IndividualAttributeCertificateReport for attribute certificates pursuant to<br />

[RFC3281] that are not already part of a signature,<br />

• an IndividualCRLCertificateReport for revocation lists pursuant to [RFC5280]<br />

that are not already part of a signature,<br />

• an IndividualOCSPReport for OCSP responses pursuant to [RFC5280] that are not<br />

already part of a signature, <strong>and</strong> finally<br />

• an EvidenceRecordReport for evidence records pursuant to [RFC4998] or [XMLERS].<br />

Federal Office for Information Security 31


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The following Figure 13 depicts again the structure of the vr:VerificationReport structure<br />

concretised on the basis of the OASIS Profile [OASIS-VR].<br />

Figure 13: Overview of the vr:VerificationReport dData sStructure [OASIS-VR]<br />

3.6.6 Sample realisation of the XAIP data structures on the basis of XFDU<br />

It is explained in this section how the XAIP data structure introduced above can be realised on the<br />

basis of the [XFDU] specifications by means of which any synergies with the preliminary work in the<br />

XFDU environment can be used. In particular, this is how the experiences collected in the aerospace<br />

industry executing XML based archival information packages pursuant to [OAIS] can be applied <strong>and</strong><br />

the freely available XFDU 18 library of the European Space Agency (ESA) can be used.<br />

To do so, the main structures of [XFDU] will be introduced briefly in Section 3.6.7 before<br />

recommendations for the realisation of an XAIP on the basis of [XFDU] are made in Section 3.6.8.<br />

3.6.7 Fundamentals of XFDU<br />

After a rough overview of XFDU in section 3.6.7.1, the following sections will go into the realisation<br />

of the elements of the XFDU structure relevant for the realisation of an XAIP:<br />

• packageHeader (see Section 3.6.7.2)<br />

• informationPackageMap (see Section 3.6.7.3)<br />

• metadataSection (see Section 3.6.7.4)<br />

18 See http://www.gael.fr/xfdu/site/ .<br />

32 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

• dataObjectSection (see Section 3.6.7.5)<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Because no behaviorSection is needed for the realisation of an XAIP, it will not be described<br />

here in more detail.<br />

3.6.7.1 Overview of XFDU<br />

As implied in Figure 14 <strong>and</strong> explained in more detail in [XFDU], an XFDU (XML Formatted Data<br />

Unit) generally consists of a (compressed) Package Interchange File that contains, in addition to an<br />

XML based manifest document, additional files to which the manifest document refers.<br />

However, for the realisation of an XAIP for the purposes of trusted long-term storage, only the XML<br />

based manifest document is used so that an Archival Information Package that bears all of the<br />

information in it arises.<br />

Figure 14: Conceptual look at an XFDU package (from [XFDU], figure 2-1)<br />

The XFDU manifest is itself an XML file that fulfils the schema specified in [XFDU].<br />

Federal Office for Information Security 33


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 15: Structure of the XFDU manifest document<br />

As can be seen in Figure 15, the XFDU manifest includes the following elements:<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

• packageHeader – can contain general information about the entire information package<br />

<strong>and</strong> its environment. Additional details can be found in [XFDU], Section 5.<br />

• informationPackageMap – contains a sequence of content data derived by means of an<br />

abstraction mechanism from the contentUnitType data type. In the case of the<br />

ContentUnit elements arising in this manner, this can be a sequence of references to data<br />

objects (dataObjectPointer), references to complete XFDU structures<br />

(XFDUPointer), included ContentUnit structures, or structures defined in the scope of<br />

an extension (extension). Furthermore, the ContentUnit elements have attributes<br />

which can refer to the correspondingly classified meta data <strong>and</strong>, as the case may be, a<br />

stipulated behaviorObject. Additional details can be found in [XFDU], Sections 6-7.<br />

• metadataSection – can contain a sequence of metaDataObject elements. Additional<br />

details on this can be found in section 3.6.7.2 <strong>and</strong> [XFDU], Section 9.<br />

• dataObjectSection – can contain a sequence of dataObject elements. Additional<br />

details on this can be found in section 3.6.7.5 <strong>and</strong> [XFDU], Section 8.<br />

• behaviorSection – can contain a sequence of behaviorObject elements by means of<br />

which executable functions can be linked with the content data. To do so, the<br />

behaviorObject element contains the interfaceDefinition element that, in turn,<br />

contains a sequence of input parameters (inputParameter). Additional details can be<br />

found in [XFDU], Section 10. The behaviorSection element is not needed in the scope<br />

of the trustworthy long-term storage on account of the system environment that is, as a rule,<br />

defined.<br />

34 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Furthermore, the XFDU element possesses an objID attribute by means of which the entire<br />

information package is designated in a unique way (also see archiveObjectID in the<br />

xaip:packageHeader structure, Section 3.2).<br />

As sketched in Figure 16, a ContentUnit that can be assigned to a behaviorObject can refer to<br />

other contents in the form of additional ContentUnit elements as well as corresponding objects in<br />

the xfdu:dataObjectSection <strong>and</strong> xfdu:metadataSection.<br />

Figure 16: Logical view of the XFDU manifest (from [XFDU], Figure 2-2)<br />

3.6.7.2 Structure of the xfdu:packageHeader element.<br />

As seen in Figure 17, the xfdu:packageHeader element consists of a volumeInfo element<br />

<strong>and</strong>, as the case may be, a sequence of environmentInfo elements.<br />

Federal Office for Information Security 35


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 17: The structure of the packageHeader element<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The volumeInfo element contains information on the used XFDU specifications<br />

(specificationVersion) <strong>and</strong>, if applicable, additional information on the relative position of<br />

the current XFDU in a sequence of XFDUs (sequenceInformation). Information about the<br />

environment in which the XFDU arose can be contained in the environmentInfo elements.<br />

3.6.7.3 Structure of the xfdu:informationPackageMap element<br />

As can be seen in Figure 18, the xfdu:informationPackageMap element consists of a sequence<br />

of content units (xfdu:abstractContentUnit elements) which, in turn,<br />

• refer to additional XFDU structures (XFDUPointer),<br />

• refer to data objects (dataObjectPointer),<br />

• a sequence of subordinated content units (xfdu:abstractContentUnit), or<br />

• contain other information defined by means of a specifications extension (extension).<br />

36 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 18: Structure of the xfdu:informationPackageMap element<br />

3.6.7.4 Structure of the xfdu:metadataSection element<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

As seen in Figure 19, the xfdu:metadataSection element consists of a sequence of<br />

metadataObject elements.<br />

Figure 19: Structure of the xfdu:metadataSection element<br />

The metadataObject element can, in turn, contain the following elements:<br />

• metadataReference – to refer to meta data outside of the information package,<br />

• metadataWrap – to encapsulate XML based or binary meta data, <strong>and</strong><br />

• dataObjectPointer – to refer to data objects that are deposited in the<br />

dataObjectSection (also see Section 3.6.7.5) or that are referred to there.<br />

Federal Office for Information Security 37


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

In addition to an obligatory ID attribute that can be referred to in the ContentUnit elements, the<br />

metadataObject contains attributes for classification of the meta data 19 . In doing so, one should<br />

differentiate between the following categories pursuant to [OAIS] (see Section 4.2.1.4 in [OAIS]) <strong>and</strong><br />

[XFDU] (see Section 9 in [XFDU]:<br />

• Representation information (REP),<br />

• Preservation description information (PDI), <strong>and</strong><br />

• Descriptive information (DMD).<br />

In turn, there are different classes in these categories. For example, there are especially important PDI<br />

categories in the <strong>Guideline</strong> for Preservation of Evidence of Cryptographically Signed Documents at<br />

h<strong>and</strong>, among others those in the following classes (also see [OAIS], section 4.2.1.4.2):<br />

• REFERENCE – contains indentifiers by means of which the ContentUnit is uniquely<br />

identified in the “outside world,”<br />

• CONTEXT – describes the relationship between the ContentUnit <strong>and</strong> its environment,<br />

• PROVENANCE – describes the origin of the ContentUnit <strong>and</strong> any changes since it arose,<br />

<strong>and</strong><br />

• FIXITY – contains information by means of which the integrity <strong>and</strong> authenticity of the data<br />

can be proved. It will be described in section 3.6.8.5 how certain supplemental evidence data<br />

can be deposited in the XFDU structure.<br />

3.6.7.5 Structure of the xfdu:dataObjectSection Element<br />

As seen in Figure 20, the xfdu:dataObjectSection element consists of a sequence of<br />

dataObject elements.<br />

Figure 20: Structure of the xfdu:dataObjectSection element<br />

A dataObject element can, in turn, contain the following elements:<br />

19 The meta data are defined as “data about other data" in [OAIS] <strong>and</strong> [XFDU].<br />

38 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

• byteStream – can arise multiple times <strong>and</strong> contains either direct binary or XML based<br />

contents (fileContent) or references to the corresponding data (fileLocation), which<br />

in turn can be furnished with checksums (checksum).<br />

• checksum – can contain a checksum for the data object.<br />

• transformObject – can arise multiple times <strong>and</strong> specifies which transformation steps<br />

were applied to the original data before depositing, <strong>and</strong> thus must be reversed to reconstruct it.<br />

Furthermore, multiple attributes are assigned to a dataObject by means of which one can refer to<br />

them <strong>and</strong>, e.g. to REP meta data (see Section 3.6.7.2). Furthermore, the MIME-type <strong>and</strong> the size of the<br />

data can be stored in these attributes.<br />

3.6.8 Realisation of an XAIP with XFDU<br />

A possible realisation of an XAIP container will be sketched in this section on the basis of the<br />

previously described XFDU structure. To do so, first in Section 3.6.8.1 a rough overview of the<br />

correspondence between XAIP <strong>and</strong> XFDU will be provided before the realisation of an XAIP on the<br />

basis of XFDU is described in more detail in the following sub-chapters.<br />

3.6.8.1 Overview of correspondence between XAIP <strong>and</strong> XFDU<br />

As shown in Figure 21, the packageHeader structure of the XAIP (see Sections 3.2 <strong>and</strong> 3.6.7.2)<br />

contains approximately the same information as the element in XFDU of the same name, including the<br />

"table of contents" in the xfdu:informationPackageMap element. Whereas there is a direct<br />

correlation between the XAIP <strong>and</strong> the XFDU regarding the metadataSection (see Section 3.3 <strong>and</strong><br />

3.6.7.4) <strong>and</strong> the dataObjectSection (see Section 3.4 <strong>and</strong> 3.6.7.5), the contents of the<br />

credentialSection of the XAIP are stored as specific meta data in XFDU (in the<br />

xfdu:metaDataSection) because the XFDU specification does not stipulate any specific section<br />

for supplemental evidence data in the style of a credentialSection.<br />

The xfdu:behaviorSection is not needed for the intended purposes for trustworthy long-term<br />

storage, <strong>and</strong> is not present in the case of an XAIP for that reason.<br />

Federal Office for Information Security 39


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

Figure 21: Overview of realisation of an XAIP with XFDU<br />

3.6.8.2 Realisation of the XAIP packageHeader in XFDU<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

As explained in Section 3.2, the PackageHeader in particular contains the following elements:<br />

• AOID – corresponds to the objID attribute in XFDUType.<br />

• textInfo – corresponds to the attribute of the same name in XFDUType.<br />

Furthermore, there is a range of additional elements in the XAIP packageHeader that should be<br />

deposited with the XFDU as meta data in the preservation description information (PDI) category with<br />

the classification described below (see Section 3.6.7.4) in more detail:<br />

• packageID – includes if applicable the identifier of the Archival Information Package used for<br />

the transaction application <strong>and</strong> is deposited as meta data in the REFERENCE class.<br />

• submissionInfo – contains information about the archiving transaction application <strong>and</strong><br />

the process of archiving <strong>and</strong> is deposited as meta data in the PROVENANCE class.<br />

• preservationInfo – contains the retention period <strong>and</strong> is deposited as meta data in the<br />

PROVENANCE class.<br />

After all, XAIP has an explicit schemaLocation element that is implicitly included in the XML<br />

based XFDU structure <strong>and</strong> a packageManifest that includes information on the contents of the<br />

Archival Information Package <strong>and</strong> corresponds to the informationPackageMap in [XFDU].<br />

As explained in Section 3.2, the xaip:PackageInfoUnit as the heart of the<br />

xaip:VersionManifest element contains the following elements in particular that correspond<br />

directly to the following attributes in the informationPackageMapType:<br />

• packageUnitID – corresponds to the ID attribute.<br />

• unitType – corresponds to the packageType attribute.<br />

40 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

• textInfo – corresponds to the attribute of the same name.<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Additionally, the xaip:PackageInfoUnit element in an XAIP contains a sequences of references to<br />

associated payload data, meta data, <strong>and</strong> credential objects. With the XFDU, such references are not<br />

contained in the “table of contents," but rather arise from the data objects.<br />

After all, there is a dataObjectPointer element in the XAIP element that corresponds to the<br />

element of the same name in [XFDU], <strong>and</strong> it is possible in both cases to use it to map hierarchical<br />

relations between content units.<br />

3.6.8.3 Realisation of the XAIP metaDataObjectSection in XFDU<br />

The metaDataObjectSection of the XAIP container (see Section 3.3) <strong>and</strong> the XFDU (see<br />

Section 3.6.7.4) are very similar, so it is possible for there to be especially simple assignment of the<br />

respective elements.<br />

In both cases, the metaDataObjectSection consists of a sequence of meta data objects<br />

(xaip:metaDataObject or 20 xfdu:metaDataObject) that have the following contents:<br />

• metaDataID – corresponds to the ID attribute.<br />

• classification – corresponds to the attribute of the same name.<br />

• category – corresponds to the attribute of the same name.<br />

• Contents of the metaData – corresponds to the metaDataWrap element in XFDU.<br />

Furthermore, with XAIP there is also the possibility of inserting free text information (textInfo)<br />

that must be contained in the xfdu:metaData element itself in case of [XFDU].<br />

On the other h<strong>and</strong>, [XFDU] also offers the ability to refer additionally to externally deposited meta<br />

data (xfdu:metaDataReference) or to data objects contained in XFDU<br />

(cfdu:dataObjectPointer).<br />

For the realisation of an XAIP, though, no references to externally deposited meta data<br />

(xfdu:metaDataReference) should be used; rather, the XML based Archival Information Package<br />

should contain all of the meta data itself in order to make migration easy.<br />

3.6.8.4 Realisation of the XAIP dataObjectSection in XFDU<br />

The dataObjectSection of the XAIP container (see Section 3.4) <strong>and</strong> the XFDU (see Section<br />

3.6.7.5) are also very similar, so it is possible for there to be especially simple assignment of the<br />

respective elements.<br />

In both cases, the dataObjectSection consists of a sequence of data objects (DataObject or<br />

dataObject) that, in addition to the actual content data (contentData or byteStream 21 ) <strong>and</strong><br />

20 In the following comparison, the XAIP element (e.g. MetaDataObject) will be listed first, then the<br />

corresponding XFDU element (e.g. xfdu:metaDataObject).<br />

21 The [XFDU] specifications make it possible to divide a payload data unit into different byteStream<br />

elements. This option should not be used. In accordance with this, the combinationName attribute with<br />

the realisation of an XAIP will, as a rule, be missing.<br />

Federal Office for Information Security 41


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

an identifier (dataObjectID or ID (as XML attribute) optionally contains a checksum (CheckSum<br />

or checksum). In both cases, XML based <strong>and</strong> binary data can be stored.<br />

As with XAIP, there can be an optional sequence of xfdu:transformObject elements in<br />

[XFDU] with which the stored data can be transformed (e.g. canonicalized or encrypted). In the case<br />

of the realisation of an XAIP, though, no such elements should be used; rather any transformations<br />

should always be executed outside of the archive.<br />

Furthermore, the following attributes exist pursuant to [XFDU]:<br />

• repID – makes it possible to refer to associated REP meta data.<br />

• mimeType – makes it possible to indicate of the MIME-type 22 of the data.<br />

• size – makes it possible to indicate the size of the data object.<br />

• registrationGroup – makes it possible to provide information about the registration<br />

process associated with the data.<br />

3.6.8.5 Realisation of the XAIP credentialsSection in XFDU<br />

As shown in Figure 15, there is no specific (credentialsSection) element (see Section 3.5) in<br />

which the signature data <strong>and</strong> evidence records would be stored in the XFDU structure. Rather, as<br />

implied in Figure 21, it is recommended that the signature data be deposited as meta data of a certain<br />

category <strong>and</strong> classification in the xfdu:metaDataSection element (see Section 3.6.7.4).<br />

In particular, the CredentialObject described in more detail in the following should be contained<br />

in a corresponding xfdu:metadataObject/metadataWrap/xmlObject in the XFDU<br />

structure for each supplementary evidence data object (signature, time stamp, certificate, certificate<br />

status information).<br />

In this metaDataObject, the attribute category=”PDI” <strong>and</strong> classification=”FIXITY”<br />

are also to be occupied in addition to the obligatory ID attribute. The optional elements<br />

metaDataReference <strong>and</strong> dataObjectPointer as well as the vocabularyName <strong>and</strong><br />

mimeType attributes should not be present.<br />

The xfdu:metaDataObject has exactly one child, metadataWrap, which in turn contains an<br />

xaip:CredentialObject element (see Sections 3.5 <strong>and</strong> 3.6.5) in its child, xmlData.<br />

22 See http://www.iana.org/assignments/media-types/ .<br />

42 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

4. Payload data formats<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The following section describes electronic data formats that are recommended at the time of the<br />

publication of this <strong>Technical</strong> <strong>Guideline</strong> for the long-term preservation of payload data, primarily with<br />

consideration for the long-term ability <strong>and</strong> automatic readability <strong>and</strong> interperability 23 .<br />

Payload data includes both the actual content data (primary information or also object data) <strong>and</strong> the<br />

meta data that describes the transaction <strong>and</strong> archiving context.<br />

4.1 Metadata<br />

In the broadest sense, meta data are data that describe other data. Metadata are markup data that<br />

describe the structures <strong>and</strong> context of data during the processing of data by IT systems that create,<br />

processes, manage, <strong>and</strong> store the data. The meta data of an Archival Information Package serve the<br />

identification <strong>and</strong> reconstruction of the administrative or transaction context of the stored content data.<br />

XML based solutions have established themselves as the global st<strong>and</strong>ard for the cross-platform<br />

exchange of data for the structural description of electronic documents, i.e. the mapping <strong>and</strong><br />

describing in a machine-readable manner of document structures. 24<br />

An Archival Information Package, i.e. an electronic document intended for long-term depositing in an<br />

electronic archive system in the sense of this <strong>Guideline</strong> is therefore a self-explanatory <strong>and</strong> properly<br />

formed XML document that can be verified against a valid <strong>and</strong> authorised XML schema.<br />

4.1.1 Extensible Markup Language (XML)<br />

The Extensible Markup Language [XML] is a format description language developed primarily for the<br />

Internet for the exchange of structured data <strong>and</strong> was st<strong>and</strong>ardised in 1997 by the Word Wide Web<br />

Consortium (W3C). 25<br />

On the syntax level, XML, as a text-based meta markup language, does not just support the<br />

description, rather it also supports the automatic display, manipulation, <strong>and</strong> processing of logically<br />

structured data, <strong>and</strong> furthermore, it is characterised by good exp<strong>and</strong>ability <strong>and</strong> a great deal of<br />

flexibility.<br />

Rules <strong>and</strong> structure definitions in XML syntax (XML schema) on a semantic level support the<br />

mapping of structured content models. XML schemas do not only allow a formal <strong>and</strong> machinereadable<br />

description of an XML vocabulary allowed for the exchange of data, but rather they also<br />

allow the development of complex data structures <strong>and</strong> the formulation of processing instructions. An<br />

XML schema uses a formal grammar to determine which XML elements are defined, which<br />

processing rules should be executed in what manner, <strong>and</strong> which meaning the individual elements have.<br />

23 Additional definitions <strong>and</strong> recommendations regarding suitable document formats can be found at<br />

http://www.kbst.bund.de/saga.<br />

24 For that reason, the St<strong>and</strong>ards <strong>and</strong> Architectures for E-Government applications [SAGA] in the version 3.0<br />

from October 2006 promote XML as the universal <strong>and</strong> primary st<strong>and</strong>ard for the exchange of data in <strong>and</strong> with<br />

the administration. Newly created systems should principally be able to exchange data using XML.<br />

25 more at: http://www.w3c.org/XML/.<br />

Federal Office for Information Security 43


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The confidentiality of XML documents can be ensured by means of “XML Encryption” [XMLENC],<br />

the integrity <strong>and</strong> authenticity by means of “XML Digital Signature” [XMLDSIG]. In doing so,<br />

different forms of XML signatures will be differentiated depending on whether the signatures are<br />

within or outside of the XML document.<br />

Use<br />

For all data/documents <strong>and</strong> as character set <strong>and</strong> descriptive language for all of the Archival<br />

Information Packages that comform to this <strong>Technical</strong> <strong>Guideline</strong>: A valid XML formatted Archival<br />

Information Package shall fulfil the XML specifications of the World Wide Web Consortium (W3C)<br />

[XML].<br />

4.1.2 XML Schema (XSD)<br />

XML schema is an XML markup language to define the structures of XML documents (XML<br />

instances). With the help of an XML schema it is possible to formalise structures <strong>and</strong> limitations<br />

expressed in the form of rules or structure modules that apply to a class of XML documents. XML<br />

schema are used as a rule in order to document an applicable <strong>and</strong> valid XML vocabulary for the<br />

exchange of data within a business area or branch.<br />

In doing so, the main purpose of an XML schema is the validation of XML documents. By validating<br />

an XML document against a schema one can ensure that the contents of the XML document<br />

correspond to the agreed rules.<br />

An Archival Information Package in the sense of this <strong>Guideline</strong> shall be verified against a valid <strong>and</strong><br />

authorised XML schema before being deposited in electronic long-term storage. The authorisation<br />

shall ensure that the creator (owner) of the schema is uniquely identified <strong>and</strong> that the schema cannot<br />

be manipulated without being noticed.<br />

Use<br />

For all archival information packages that conform to this <strong>Guideline</strong>: A schema that conforms to this<br />

<strong>Guideline</strong> shall implement the normative recommendations of the XML Schema Working Group of the<br />

W3C [XSD] 26 .<br />

4.2 Content Data (Object Data)<br />

It shall be ensured for a long-term legally compliant preservation of electronic primary information<br />

(content data) that the negotiability <strong>and</strong> (machine) readability of the stored electronic information can<br />

be guaranteed by suitable measures for the duration of the statutory preservation periods at a<br />

minimum.<br />

In order to ensure the long-term negotiability, solely st<strong>and</strong>ardised data formats that are stable over the<br />

long term with a public description should be used. 27 The use of st<strong>and</strong>ard formats does not only reduce<br />

26 A basic set of requirements that is described in the XML Schema Requirements Note of the W3C leads to a<br />

number of uses for schemas <strong>and</strong> the draft guidelines upon which they were based (see<br />

http://www.w3.org/<strong>TR</strong>/NOTE-xml-schema.req ).<br />

27 See also: Printing 16/5927 of the German Bundestag from 4 July 2007. According to this, st<strong>and</strong>ards are to be<br />

considered open "if they make the exchange between different platforms <strong>and</strong> applications possible <strong>and</strong> are<br />

adequately documented. The interfaces must be open <strong>and</strong> the technical specifications executable. In doing so,<br />

44 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

the dependence on hardware <strong>and</strong> software environments, but also the necessity for future format<br />

transformations, which require a non-insignificant amount of effort, in particular when electronic<br />

signatures are used.<br />

4.2.1 Documents (Records)<br />

The DOMEA Organisation Concept 2.1 28 <strong>and</strong> the St<strong>and</strong>ards <strong>and</strong> Architectures for<br />

E-Government Applications (SAGA) 29 , like the Model Requirements for the Management of<br />

Electronic Records - Moreq2 30 of the European Commission, recommend that only a few st<strong>and</strong>ardised<br />

data formats be used for the long-term depositing of electronic written documents.<br />

These include (at the time of the publication of this <strong>Technical</strong> <strong>Guideline</strong>):<br />

4.2.1.1 Text (ASCII)<br />

ASCII (American St<strong>and</strong>ard Code for Information Interchange) st<strong>and</strong>s for a character set <strong>and</strong> for a text<br />

format. An ASCII text describes a document that only consists of characters of the ASCII character set,<br />

<strong>and</strong> thus does not include any layout information <strong>and</strong> is thus particularly well suited for simple text<br />

information <strong>and</strong> meta data. The ASCII code was specified in 1972 by the International Organization<br />

for St<strong>and</strong>ardization as ISO 646 31 <strong>and</strong>, from the perspective of today, offer the best prerequisites for<br />

ongoing negotiability. Because ASCII by its definition does not incorporate any character sets, correct<br />

display is not always guaranteed.<br />

The format originally consists of 7 bit with which 128 (character) combinations can be displayed, <strong>and</strong><br />

thus a character set based on the Latin alphabet as used in the modern English language. 8-bit ASCII<br />

character sets were defined in order to map some special characters, such as the umlauts in the German<br />

language.<br />

The so-called Unicode St<strong>and</strong>ard is a further development of the ASCII coding 32 . Depending on the<br />

coding table, it is based on 8 (UTF-8), 16 (UTF-16) or 32 (UTF-32) bits per character code.<br />

Use<br />

For simple, unformatted texts (text data): Documents (text data) that are solely in Latin letters should<br />

only use the character set defined in ISO St<strong>and</strong>ard ISO 646:1991 (ASCII) [ANSIX3.4].<br />

Documents (text data) that are not solely in Latin letters should use the current version of the Unicode<br />

St<strong>and</strong>ard [UNICODE].<br />

Unicode is the functional equivalent to St<strong>and</strong>ard ISO 10646-1:2000. Texts that conform to Unicode are<br />

principally coded in UTF-8 or UTF-16.<br />

the design of the conditions of use should correspond to the specifications of the international st<strong>and</strong>ardisation<br />

organisation.”<br />

28 See http://www.kbst.bund.de/domea .<br />

29 See http://www.kbst.bund.de/ saga .<br />

30 See http://ec.europa.eu/transparency/archival_policy.<br />

31 See http://www.iso.org/.<br />

32 These specifications are available at http://www.unicode.org/ .<br />

Federal Office for Information Security 45


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

4.2.1.2 PDF/A<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

PDF/A-1 33 is a st<strong>and</strong>ard established as an ISO st<strong>and</strong>ard on the basis of [PDF 1.4] for the long-term<br />

archiving of electronic documents.<br />

Published as ISO 19005-1:2005 34 , PDF/A-1 defines the requirements of a PDF that conforms to the<br />

st<strong>and</strong>ard <strong>and</strong> regulates the use of PDF with regard to the long-term stability <strong>and</strong> reproducibility.<br />

The st<strong>and</strong>ard specifies two levels of conformance:<br />

• PDF/A-1a - Level A conformance: Both unique visual reproducibility <strong>and</strong> the consistent use of<br />

Unicode <strong>and</strong> content structuring of the document.<br />

• PDF/A-1b - Level B conformance: unique visual reproducibility.<br />

PDF/A is set up as a series of st<strong>and</strong>ards. Additional parts are currently being worked on in the<br />

competent ISO committee (ISO TC171 SC2 WG5). A second part of the st<strong>and</strong>ard PDF/A-2 will likely<br />

appear in the second quarter of 2011 that is based on the ISO version of the PDF format (ISO32000 35 )<br />

<strong>and</strong> takes into account a number of technological innovations that have arisen in the meantime, such as<br />

JPEG2000.<br />

Because there is another series of st<strong>and</strong>ards based on PDF since 2001, PDF/X 36 - for the exchange of<br />

masters in the graphic industry, it was ensured during the development of PDF/A that a valid PDF/ A<br />

file can also be a valid PDF/X file.<br />

PDF/A, like PDF version 1.4, supports various security measures, in particular also the embedding of<br />

electronic signatures in the internationally recognised PKCS#7 format [PKCS#7].<br />

PDF/A is also recommended for archiving by the the <strong>Guideline</strong>s for Electronic Records Management<br />

[Moreq2] promoted by the European Commission as the format for archiving.<br />

Use<br />

For all (primarily) character oriented static documents.<br />

Recommendation<br />

PDF files should fulfil the ISO 19005-1 (PDF/A-1) st<strong>and</strong>ard. In doing so, the following limitations<br />

apply based on the conformity level:<br />

• Converting: If the file is converted from another file format, e.g. Microsoft Word, into PDF/A<br />

then a program shall be used that explicitly enables the creation of PDF/A compliant files.<br />

Alternatively, it can be outputed in version 1.4 of PDF, for example with the help of the<br />

program developed by Adobe, Acrobat Distiller version 5.0 or higher, or the freely available<br />

AFPL GhostScript in version 7.0 or higher. In this case, too, final conversion into PDF/A with<br />

a corresponding converter should be carried out because PDF 1.4 allowes structures <strong>and</strong><br />

contents that are not allowed in PDF/A.<br />

• Tagged PDF: Tagged PDF stipulates a defined internal structure for text content of a PDF file<br />

in order to retrieve its contents with suitable tools so that they can be processed further for<br />

other purposes. Possible applications are the transmission of contents in file formats like<br />

33 See http://www.adobe.de/products/acrobat/pdfs/pdfarchiving.pdf .<br />

34 See http://www.iso.org/ .<br />

35 See http://www.iso.org/ .<br />

36 PDF/X is st<strong>and</strong>ardised in the ISO st<strong>and</strong>ards 15929 <strong>and</strong> 15930; ISO 15929 defines the PDF/X approach in<br />

general; ISO 15930 defines concrete parts of the st<strong>and</strong>ard, more under http://www.iso.org/ .<br />

46 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

XML, HTML, or RTF. Files shall be created in such a manner that they correspond to Tagged<br />

PDF as described in the [PDF 1.4]. The conformity level A (PDF/A-1a) can be reached in this<br />

manner.<br />

• Linearised PDF: Linearised PDF was developed in order to be able to show the pages of a<br />

PDF file as quickly as possible within network environments, such as the World Wide Web.<br />

This profile does not impair the ability to archive the data over the long term; it is allowed to<br />

use it when generating PDF files.<br />

• Meta data: A file that can be archived should be self-explanatory insofar as possible, which<br />

can be guaranteed, among other ways, by storing meta data on the basis of the eXtensible<br />

Metadata Platform (XMP) 37 developed by Adobe in the file itself. The storage of the meta data<br />

must be done in XMP format. This also concerns the original PDF meta data such as author,<br />

title, creation tool, etc., insofar as they are used in the document.<br />

• Encryption <strong>and</strong> other security settings: Read-access to a file may not be subject to any<br />

limitations whatsoever; in particular no passwords may be used in order to prevent the<br />

application of certain functions to the file. It is thereby guaranteed, for example, that the file<br />

can be transmitted into other formats for the purposes of archiving if this is necessary to<br />

maintain its contents.<br />

Limitations on printing shall be avoided. Security options that go further, such as limitations<br />

on the extraction of passages of text or copying options shall not be used.<br />

• Authenticity <strong>and</strong> integrity: The use of cryptographic procedures (electronic signatures <strong>and</strong><br />

time stamps) in order to prove the authenticity <strong>and</strong> integrity of a PDF file is recommended<br />

when not expressly required by legal regulations. In doing so, though, only those signature<br />

creation applications should be used that have been evaluated <strong>and</strong> certified by the <strong>BSI</strong> as<br />

secure signature application componentsin the sense of the German Signature Act SigG.<br />

Should signatures be embedded in the document, the container structure introduced with PDF<br />

1.3 based on PKCS#7 applies.<br />

• Text: Each font used in the text of the file shall be embedded in the file; therefore, the file<br />

shall contain the graphic descriptions of all of the fonts used therein in addition to the actual<br />

text. For optimisation, only the characters currently used for description of the test must be<br />

embedded (Subsetting). This measure ensures that PDF display programs can display the file<br />

in the form intended by the author without having to make use of replacement fonts that could<br />

change the appearance of the file. The st<strong>and</strong>ard fonts provided by Adobe shall also always be<br />

embedded insofar as they are used in the document.<br />

Principally, only public available fonts should be used, that are in no way subject to<br />

limitations by the owners of the rights. Insofar as possible, all of the characters contained in<br />

the file should be present in machine-readable coded form <strong>and</strong> not as digitalised pictures of<br />

characters so that they are available for search functions.<br />

For sections of text that include characters that go beyond the ISO-8859-1 character set for<br />

American English <strong>and</strong> Western European languages [ISO-Latin-1] 38 , the [UNICODE]<br />

character set should be used. Thus, an author should encode texts either in ISO-Latin-1 or in<br />

37 See XMP Adobe eXtensible Metadata Platform; more under http://www.adobe.com/products/xmp<br />

38<br />

ISO/IEC 8859-1:1998 Information technology -8-bit single-byte coded graphic character sets, Part 1: Latin<br />

alphabet no. 1, see: http://www.iso.org/ .<br />

Federal Office for Information Security 47<br />

.


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

UNICODE, which is realised concretely by choosing a corresponding font that has consistent<br />

coding such as Arial Unicode MS.<br />

• Graphics: If the file contains graphic depictions (figures), then they shall be included either<br />

with their source colour profiles (e.g. CalRGB) or all graphics are assigned a uniform source<br />

colour profile or OutputIntent (e.g. st<strong>and</strong>ard red-green-blue [sRGB] 39 . This ensure a deviceindependent<br />

colour space specification.<br />

The so-called transparency key introduced as a visual effect in PDF version 1.4 that makes it<br />

possible to generate graphics that appear to overlap or be translucent generally shall not be<br />

used in general. Corresponding pictures with transparency are to be converted (flattening).<br />

Alternative views (e.g. so-called downsampling for quick previews in the web) are allowed<br />

neither for colour nor for black <strong>and</strong> white pictures. The same applies to levels.<br />

The picture formats allowed in a PDF/A-1 file are, among others, TIFF/G4, JBIG, JBIG2 <strong>and</strong><br />

JPEG. The JPEG2000 format is not allowed in PDF/A-1.<br />

• Integration: All contents needed for the presentation of the document shall be included in the<br />

file itself so that it is not necessary to load data streams from external sources. The file may<br />

not included any object that would require an external application for its display. A view that<br />

requires a rendering for specific output devices is not allowed.<br />

• Audio/Video: For the reasons listed above, a file may not contain audio or video data streams.<br />

• Links: Internal links that refer to jump labels within the file, such as headlines, are allowed.<br />

External links that refer to jump labels outside of the file, such as hyperlinks to resources in<br />

the Internet, should be designed if possible so that all symbolic addresses of these links, such<br />

as file path, uniform resource locators (URL), or persistent identifiers, are contained in the text<br />

of the file <strong>and</strong> can be displayed on the screen or printed on paper without any additional<br />

measures. For example: instead of “Website of the ArchiSafe project" with a link behind the<br />

text, one should write: “Website of the ArchiSafe Project (http://www.archisafe.de)".<br />

• Commentary: The use of commentary is allowed as long as they do not contain audio or<br />

video data streams or any other data attachments.<br />

• Executable Actions: The file shall not request executable comm<strong>and</strong> strings such as scripts; in<br />

particular JavaScript may not be included in the fields of forms or any other place. Form fields<br />

themselves are allowed.<br />

4.2.1.3 ODF<br />

The Open Document Format (ODF) was st<strong>and</strong>ardised by OASIS 40 as an XML-based document format<br />

for texts, spreadsheet calculations, presentations, <strong>and</strong> other office documents. The contents of the<br />

documents <strong>and</strong> information about their layout are separated from each other <strong>and</strong> thus they can be<br />

processed independently. It can be used to exchange complex documents that are intended for further<br />

processing.<br />

39<br />

sRGB: http://www.srgb.com/srgb.html or as IEC-St<strong>and</strong>ard: IEC 61966-2-1 – Ed. 1.0 – Bilingual<br />

Multimedia systems <strong>and</strong> equipment - Colour measurement <strong>and</strong> management - Part 2-1: Colour management -<br />

Default RGB colour space - sRGB, see: http://webstore.iec.ch/webstore/webstore.nsf/ .<br />

40 See http://www.oasis-open.org/committees/download.php/12572/OpenDocument-v1.0-os.pdf .<br />

48 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

In November 2006, OpenDocument v1.0 was published as a st<strong>and</strong>ard under the name ISO/IEC<br />

26300:2006 41 . The OpenDocument format is supported by the platform-independent, licence-cost-free<br />

Open Office package OpenOffice.org 42 , among others.<br />

Use<br />

For all (primarily) character oriented documents<br />

4.2.1.4 TIFF 43<br />

The “Tagged Image File Format” (TIFF) makes it possible to save graphic information without loss of<br />

information <strong>and</strong> has been st<strong>and</strong>ardised pursuant to ISO 12639 for media-independent image<br />

processing. The coding of the format makes it possible to store multiple views (e.g. thumbnails) or<br />

versions of a graphic as well as text information as meta data in a file.<br />

The use of TIFF is especially recommended if the graphic information of a document is of great<br />

significance to its explanatory power. TIFF is supported by all major graphic <strong>and</strong> presentation<br />

applications.<br />

In order to achieve maximum interoperability, only those characteristics from the "Baseline TIFF" 44<br />

should be used. TIFF can be used if the ability of the format to depict multilaterial documents is<br />

needed. TIFF is especially well suited for scanned text documents (grey scale or B/W graphics).<br />

Use<br />

For figures (non coded information, for example raster images).<br />

TIFF files should fulfil the basic version 6.0 TIFF specifications [TIFF6].<br />

Furthermore, the following extensions can be used:<br />

• CCITT bitlevel coding, <strong>and</strong><br />

• LZW compression.<br />

4.2.1.5 JPEG<br />

The JPEG format 45 (Joint Photographic Experts Group) st<strong>and</strong>s for a compression procedure <strong>and</strong> a<br />

graphic format <strong>and</strong> is one of the most comment graphic formats used in the Internet. The JPEG<br />

st<strong>and</strong>ard was published in 1992 as ISO/IEC 10918-1. Because the definition of the structure of JPEG<br />

files allows many freedoms, a st<strong>and</strong>ard that organises the exchange of image files compressed as<br />

JPEGs with the "JPEG File Interchange Format" (JFIF). JFIF is based on the JPEG st<strong>and</strong>ard <strong>and</strong> is<br />

platform independent.<br />

The use of the JPEG format as the alternative for the TIFF can be advisable if one has to compromise<br />

between picture quality <strong>and</strong> file size.<br />

Use<br />

41 See http://www.iso.org/ .<br />

42 See http://de.openoffice.org/ .<br />

43<br />

See http://partners. adobe.com/public/developer/en/tiff/TIFF6.pdf<br />

.<br />

44 Those characteristics that all TIFF-capable applications should support are summarized under "Baseline<br />

TIFF". For example, only the "Huffman” <strong>and</strong> “Packbits” compression procedures belong to “Baseline TIFF”, whereas<br />

“LZW”, “JPEG”, “ZIP”, <strong>and</strong> “CCITT” are optional expansions not implemented in every TIFF-capable program.<br />

45 See http://www.jpeg.org/index.html?langsel=de, st<strong>and</strong>ardised as ISO/IEC 10918-1:1994, see http://www.iso.org/<br />

st<strong>and</strong>ardised as ITU-T.81, see http://www.itu.int/rec/T-REC-T.81/en .<br />

Federal Office for Information Security 49<br />

,


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

For figures (non coded information, for example raster images).<br />

4.2.1.6 PNG<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

PNG 46 (Portable Network Graphics Format) was developed from the later “PNG Development Group”<br />

as an alternative to the GIF format <strong>and</strong> is especially suitable for use in the Internet because of the<br />

opportunity for loss-free compression <strong>and</strong> incremental display of the graphics. The PNG specifications<br />

are open <strong>and</strong> were elevated to an international st<strong>and</strong>ard in 2003 as ISO/IEC 15948 47 . Most image<br />

editing programs support PNG as st<strong>and</strong>ard. So called calibrating data blocks allow the calibration of<br />

the display so that, for example, the picture can be printed exactly as the author sees it on the screen.<br />

Use<br />

For figures (non coded information, for example raster images).<br />

4.2.2 Multi-Media <strong>Formats</strong><br />

“Multimedia" is characterised by the opportunity to use diverse digital means for portraying<br />

information (video, audio, picture, <strong>and</strong> text).<br />

In this context, a multi-media format is a self-explanatory file format that contains the content data <strong>and</strong><br />

(in the case of container formats, see below) their structure <strong>and</strong> interrelations.<br />

Three multimedia formats can be differentiated:<br />

• An audio format describes the structure of an audio file,<br />

• a video format describes the structure of a video file,<br />

• a container format can contain multiple data elements (called “streams”) with different<br />

formats. This is initially not limited to multimedia formats. The container regulates the<br />

interplay <strong>and</strong> sequence of the individual data streams. Thus, for example, a container can<br />

contain multiple audio streams on a video stream, <strong>and</strong> it is possible to embed subtitles (e.g. in<br />

the form of graphics). The audio streams can also be coded with various Codecs 48 that can be<br />

used to code or decode analogue signals or digital audio or video data <strong>and</strong> thereby map<br />

different tone qualities, for example.<br />

In the following sections, the most common representatives of the file format classes "audio", "video",<br />

<strong>and</strong> "container" are described briefly. The common container formats are not normally perceived as<br />

container formats, but rather as audio or video formats. Thus, the container formats are also described<br />

in the following sections. The recommended file formats are labelled in the corresponding manner.<br />

46 See http://www.w3.org/<strong>TR</strong>/PNG/<br />

47 See http://www.iso.org/<br />

48 Codec, a word coined for Coder/Decoder, a program or procedure (format) with which multimedia files<br />

(audio <strong>and</strong>/or video signals) can be digitally coded for the transmission by digital services/networks <strong>and</strong> then<br />

decoded again when playing. In most cases, the analogue signal is not digitalised without losses during the<br />

coding, rather there is a dynamic reduction of the analogue signal <strong>and</strong> a data compression of the digital signal<br />

which, according to the extent <strong>and</strong> the procedure can make a significant difference in the quality of the<br />

reconversion of the digital data stream into analogue signals. The main goal of the dynamic reduction <strong>and</strong><br />

compression is a reduction in the b<strong>and</strong>width needed for the transmission of the digital signal or a reduction in<br />

the amount of storage capacity needed for the saving. The compressed data are deposited in a special code<br />

format.<br />

50 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

NOTICE: The multimedia formats that are common today <strong>and</strong> recommended in this document have<br />

not been analysed yet adequately for their suitability for long-term storage in a manner comparable to<br />

PDF. Thus, for the long-term availability of the archived data, it may be necessary to archive<br />

additional data, such as sound models or video drivers, along with the raw data.<br />

NOTICE: Naturally, only a small selection of recommended multimedia formats can be provided<br />

here. Numerous other formats used in the scope of the digital saving of audio <strong>and</strong> video information<br />

exist. However, at this time in the context for long-term storage, these formats can only be given a<br />

qualified recommendation or none at all, either because they are not common enough, there are no<br />

open specifications, or the legal situation (in particular the licence conditions) make use more difficult<br />

or do not recommend it. Thus, this <strong>Guideline</strong> is oriented – insofar as possible <strong>and</strong> sensible – on the<br />

general St<strong>and</strong>ards <strong>and</strong> Architectures for E-Government Applications of the Federal Government<br />

(SAGA V4.0).<br />

4.2.2.1 Audio <strong>Formats</strong><br />

4.2.2.1.1 Ogg Encapsulation Format<br />

Ogg 49 is a container format for multimedia files. The development of the container format is directed<br />

by the Xiph.org Foundation 50 . Codecs are also made available.<br />

The best-known <strong>and</strong> most popular codec is the Vorbis 51 audio codec. As an alternative, for better<br />

quality the loss-free FLAC 52 audio codec can be used.<br />

Ogg is an alternative to proprietary formats that is free from software patents <strong>and</strong> unlimited <strong>and</strong><br />

therefore it is suitable for electronic long-term storage, in particular on account of the existing detailed<br />

format specifications that are available.<br />

Ogg-Vorbis is recommended as an audio format in SAGA V 4.0 (St<strong>and</strong>ards <strong>and</strong> Architectures for E-<br />

Government Applications).<br />

The format also has the advantage that is can also be used as a recommended video format (with<br />

another codec), which contributes to the reduction in the overall number of data formats suitable for<br />

long-term storage.<br />

4.2.2.1.2 MP4 / MPEG-4 Part 14<br />

MP4 is also a container format for multimedia files. The development of the container format was<br />

directed by the Moving Picture Experts Group <strong>and</strong> is st<strong>and</strong>ardised in ISO/IEC 14496-12 <strong>and</strong> -14<br />

(MPEG-4 part 12 <strong>and</strong> 14) 53 .<br />

As an audio format, MPEG-4 is an open, manufacturer independent st<strong>and</strong>ard <strong>and</strong> is suitable for<br />

electronic long-term storage. The audio format is recommended in SAGA V 4.0.<br />

49 Published as RFC3533, see: http://www.ietf.org/rfc/rfc3522.txt .<br />

50 See http://www.xiph.org/ogg/ .<br />

51 See http://www.vorbis.com .<br />

52 See http://flac.sourceforge.net/ .<br />

53 See http://www.iso.org/ .<br />

Federal Office for Information Security 51


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

MP4 also has the advantage that is can also be used as a recommended video format (with another<br />

codec), which contributes to the reduction in the overall number of data formats suitable for long-term<br />

storage.<br />

4.2.2.1.3 Advanced Audio Coding (AAC)<br />

Advanced Audio Coding (AAC) is a st<strong>and</strong>ardised audio format subject to losses. AAC is specified in<br />

ISO/IEC 13818-7 54 <strong>and</strong> is treated as an improved successor to MP3 because the quality is usually<br />

higher with the same bit-rate.<br />

AAC is a part of the MPEG-2 <strong>and</strong> MPEG-4 specifications <strong>and</strong> was developed by the Moving Pictures<br />

Experts Group. AAC itself is free of patents <strong>and</strong> licenses, but manufacturers of Codecs for AAC must<br />

pay licence fees.<br />

SAGA 4.0 does not mention AAC. Regardless of this, its openness <strong>and</strong> expected future popularity<br />

mean that it can certainly be recommended for long-term storage.<br />

4.2.2.1.4 EBU Broadcast Wave Format (BWF)<br />

In certain situations, it can also make sense to use the Broadcast Wave Format (BWF) pursuant to<br />

[EBU-BWF] format of the European Broadcasting Union (EBU) for the long-term preservation of<br />

audio files.<br />

4.2.2.2 Video <strong>Formats</strong><br />

4.2.2.2.1 OggEncapsulation Format<br />

Ogg 55 is a container format for multimedia files. The development of the container format is directed<br />

by the Xiph.org Foundation 56 . The Theora 57 video codec, which was also developed by the Xiph.org<br />

Foundation, is available as the suitable codec.<br />

Ogg is an alternative to proprietary formats that is free from software patents <strong>and</strong> unlimited <strong>and</strong><br />

therefore it is suitable for electronic long-term storage, in particular on account of the existing detailed<br />

format specifications that are available.<br />

Ogg-Theora is recommended as a video format in SAGA V 4.0 (St<strong>and</strong>ards <strong>and</strong> Architectures for E-<br />

Government Applications).<br />

4.2.2.2.2 MP4 / MPEG-4 Part 14<br />

MP4 is also a container format for multimedia files. The development of the container format was<br />

directed by the Moving Picture Experts Group <strong>and</strong> is st<strong>and</strong>ardised in ISO/IEC 14496-12 <strong>and</strong> -14<br />

(MPEG-4 part 12 <strong>and</strong> 14) 58 .<br />

As a video format, MPEG-4 is an open, manufacturer independent st<strong>and</strong>ard <strong>and</strong> is suitable for<br />

electronic long-term storage. The video format is recommended in SAGA V 4.0.<br />

54 See http://www.iso.org/<br />

55 Published as RFC3533, see: http://www.ietf.org/rfc/rfc3522.txt<br />

56 See http://www.xiph.org/ogg/<br />

57 See http://www.theora.org/<br />

58 See http://www.iso.org/<br />

52 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

MP4 also has the advantage that is can also be used as a recommended audio format (with another<br />

codec), which contributes to the reduction in the overall number of data formats suitable for long-term<br />

storage.<br />

4.3 Base64 coding<br />

All (binary) primary information (content data) that was introduced in Chapter 4.2 should be saved<br />

within the XAIP structure of the Archival Information Package (see Chapter 3.4). Naturally, at the<br />

same time there is also the requirement here that the format <strong>and</strong> data be readable for a long time in the<br />

future, also by other systems <strong>and</strong> platforms.<br />

Entering binary data into an XML structure without changes is technically possible, but as a rule this<br />

causes a number of problems <strong>and</strong> is sure to lead to a certain dependency on a software or platform. For<br />

that reason, binary data must first be brought into a platform-independent form. For legal reasons, the<br />

coding necessary on the contents of the binary data may not make any changes; thus this shall be a<br />

bijective mapping 59 .<br />

BASE64 coding pursuant to [RFC4648] 60 is the most common method. It is primarily used in the<br />

Internet st<strong>and</strong>ard MIME 61 (Multipurpose Internet Mail Extensions) <strong>and</strong> is thus used primarily when<br />

sending e-mail attachments. This is required to ensure the problem-free transport of any binary data<br />

because the Simple Mail Transfer Protocol (SMTP) 62 in its original version was only designed for the<br />

sending of 7-bit ASCII characters.<br />

In the case of BASE64 coding, 3 byte (24 bit) of the original file are mapped to 4 blocks, each with 6<br />

bit of the target file. In doing so, the sequence of the bits is always maintained. 6 bit per block allow 2 6<br />

= 64 possible characters. That is where the name of the procedure comes from. For these 64 possible<br />

characters, the characters A-Z, a-z, 0-9, + <strong>and</strong> / were chosen. These characters are contained both in<br />

ASCII <strong>and</strong> in EBCDIC <strong>and</strong> are independent of a code page. Thus, data can also be exchanged between<br />

non-ASCII systems.<br />

The mapping of 3 bytes to 4 characters increases the need for space by 33%. However, this<br />

disadvantage is usually accepted 63 .<br />

The following procedure should be used for encapsuling content data in an XAIP document that<br />

conforms to this <strong>Technical</strong> <strong>Guideline</strong>.<br />

• If the content data consist solely of text (ASCII) (see Chapter 4.2.1.1) or XML, these data can<br />

be inserted without re-coding into the XAIP data structure.<br />

• All other data formats shall be coded in BASE64 before they are inserted into the XAIP data<br />

structure.<br />

59 A mapping f:A->B is called bijective (or unique in reverse) if different elements in an original mass A are<br />

mapped to different elements in an image mass B, <strong>and</strong> if each element from B appears as a depiction of<br />

exactly one element of the original mass A.<br />

60 See http://www.ietf.org/rfc/rfc4648.txt .<br />

61 See http://www.ietf.org/rfc/rfc2045.txt.<br />

62 See http://www.ietf.or/rfc/rfc821.txt.<br />

63 Another coding procedures also exist. However, they are usually only used for special applications (e.g. in<br />

the post-script file format from Adobe or for the address coding of IPv6 addresses) or not at all.<br />

Federal Office for Information Security 53


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

• For BASE64 coded data, there should be an entry stipulated for the corresponding MIME<br />

format of the content data in the meta data section that contains information that could be<br />

needed for adequate representation of the content data.<br />

54 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

5. Cryptographic data formats<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The following section describes a few cryptographic data formats that are recommended at the time of<br />

the publication of this <strong>Technical</strong> <strong>Guideline</strong> for Preservation of Evidence of Cryptographically Signed<br />

Documents.<br />

5.1 Signature formats<br />

The signature formats common in practice include in particular ASN-1 based signatures of the CMS<br />

family pursuant to [PKCS#7, RFC5652, ETSI 101733] (see Section 5.1.1) <strong>and</strong> the XML based<br />

signatures pursuant to [XMLDSIG, ETSI 101903] taken into account in Section 5.1.2.<br />

Insofar as the signature formats used in the environment of the trustworthy long-term storage can be<br />

influenced, these formats should be used. Principally, though, depending on the application-specific<br />

requirements, the use of other signature formats (see [HK 06b]) can be necessary <strong>and</strong> sensible.<br />

5.1.1 PKCS#7 / CMS / CAdES<br />

The Cryptographic Message Syntax (CMS) signature format going back to [PKCS#7] pursuant to<br />

[RFC5652] is the most commonly used ASN.1 based signature format in practice. Because the data to<br />

be signed in this signature format are treated merely as binary objects – without consideration for an<br />

internal structure – any data can be signed, but the signatures cannot be embedded into the payload<br />

without further ado.<br />

Building on the basic CMS structure, specific expansions are defined in [ETSI 101733] <strong>and</strong><br />

[RFC5126] that take the special requirements for advanced electronic signatures pursuant to § 3 no. 2<br />

[SigG] into account. For example, there are attributes for counter signatures, (CounterSignature),<br />

the insertion of attribute certificates (SignatureAttributes), time stamps (ContentTimeStamp,<br />

SignatureTimeStampToken, ESCTimeStampToken, TimestampedCertsCRLs <strong>and</strong><br />

ArchiveTimeStampToken), certificates (CertificateValues), <strong>and</strong> revocation information<br />

(RevocationValues). The <strong>Guideline</strong> at h<strong>and</strong> has the following recommendations for the treatment<br />

of CMS <strong>and</strong> CAdES based signatures:<br />

CMS based signatures should be verified before the generation of the initial archive time stamp. In<br />

doing so, a CMS signature should be supplemented by a so-called CAdES-X Long (CadES-X-L)<br />

signature pursuant to [RFC5126, section 4.4.3.1] so that the renewed signature verification with any<br />

CAdES conformant signature application component is possible. In the case of such signatures, not<br />

only unique references to the certificates <strong>and</strong> revocation information used during the signature<br />

verification are inserted as with the CAdES-C signatures, but rather the actual values of the certificates<br />

(CertificateValues) <strong>and</strong> revocation information (RevocationValues) are inserted as<br />

unsigned attributes into the CMS container so that all of the information needed for a complete<br />

verification of the signature is contained in the signature itself.<br />

Federal Office for Information Security 55


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

5.1.2 XML Signatures / XAdES<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

In addition to the CMS based signatures described above, XML based signatures pursuant to<br />

[XMLDSIG] are also increasingly being used in practice. The advantage of this signature format is<br />

that the specific characteristics of XML based data are taken into account <strong>and</strong>, thus, for example, one<br />

can also sign explicitly defined parts of a document <strong>and</strong> the signatures themselves can be embedded<br />

into the payload data. Here, too, there are specific expansions for advanced electronic signatures<br />

pursuant to § 2 no. 2 [SigG] that are defined in [ETSI 101903] <strong>and</strong> [XAdES].<br />

For example, planned here are properties for counter signatures (CounterSignature), the insertion<br />

of attribute certificates (SignerRole), time stamps (AllDataObjectsTimeStamp,<br />

IndividualDataobjectsTimeStamp, SignatureTimeStamp, SigAndRefsTimeStamp,<br />

RefsOnlyTimeStamp, <strong>and</strong> ArchiveTimeStamp), certificates (CertificateValues), <strong>and</strong><br />

revocation information (RevocationValues).<br />

The <strong>Guideline</strong>s at h<strong>and</strong> have the following recommendations for the treatment of XML <strong>and</strong> XAdES<br />

based signatures:<br />

XML based signatures should be verified before the generation of the initial archive time stamp.<br />

In doing so, a XML signature should be supplemented by a so-called XAdES-X Long signature<br />

pursuant to [ETSI 101903, <strong>Annex</strong> B.2] so that the renewed signature verification with any XAdES<br />

conformant signature application component is possible. Similar to the CAdES-X Long Signature<br />

recommended above, here the certificates (CertificateValues) <strong>and</strong> revocation information<br />

(RevocationValues) needed for the signature verification are inserted into the XML signature as<br />

unsigned properties (UnsignedSignatureProperties).<br />

5.2 Certificate formats<br />

Of particular importance for trustworthy long-term storage among the various st<strong>and</strong>ardised certificate<br />

formats are the public key <strong>and</strong> attribute certificates pursuant to [X.509] (see [HK 09]).<br />

In the field of trustworthy long-term storage, certificates are used in particular for the verification of<br />

(qualified) electronic signatures. In doing so, the recommendations in [Common-PKI] (part 5 <strong>and</strong> 9)<br />

should be taken into account <strong>and</strong> corresponding verifications of the certificate status should be carried<br />

out (see Section 5.3).<br />

The certificate chain up to a trustworthy root entity that is constructed in doing so should be inserted<br />

into the unsigned CertificateValues attribute (see Section 5.1.1 with regard to this) for CMS<br />

signatures <strong>and</strong>, in the case of XML signatures, into the unsigned CertificateValues<br />

characteristic (in UnsignedSignatureProperties, see Section 5.1.2) 64 .<br />

Insofar as no analogous opportunities for the depositing of certificates are stipulated for alternative<br />

signature formats, certificates themselves should be inserted in a CredentialObject into the<br />

Archival Information Package (see Sections 3.3, 3.6.7.4 <strong>and</strong> 3.6.8.3).<br />

64 Corresponding to the data type OtherCertificates in Chapter 3.5.<br />

56 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

5.3 Certificate Validation <strong>Formats</strong><br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

Insofar as the validity of the certificates is not ensured in another way in the certificate path built<br />

during the signature verification, there shall be an explicit verification of the validity of the<br />

certificates.<br />

For this, the Online Certificate Status Protocol (OCSP) pursuant [RFC2560] should be used.<br />

Alternatively, the Server Based Certificate Validation Protocol (SCVP) pursuant to [RFC5055] can be<br />

used insofar as they are based on OCSP information from the certificate issuer.<br />

Insofar as one can influence the mechanisms available for verifying the certificate status for the used<br />

certificates in the field of the trustworthy long-term storage, no revocation pursuant to [RFC5280]<br />

should be used because this cannot determine the validity of a (qualified) electronic signature in<br />

general beyond a doubt.<br />

5.3.1 Online Certificate Status Protocol (OCSP / RFC 2560)<br />

In the case of the Online Certificate Status Protocol (OCSP) pursuant to [RFC2560], current<br />

information about the certificate status is requested directly through a challenge-response protocol, as<br />

a rule directly from the issuer of the certificate. Because the disclosure from the issuer occurs<br />

practically at the time of the signature verification, it can be ensured that the revocation information is<br />

up-to-date, unlike the case when, for example, certificate revocation lists are used. In environments<br />

with a high number of OCSP transactions, the recommendations pursuant to [RFC5019] can be<br />

observed.<br />

Insofar as the certificates are assigned to a certain CMS or XML based signature for which there is<br />

OCSP based status information at h<strong>and</strong>, the revocation information should be stored in the<br />

RevocationValues element (see Section 5.1.1-5.1.2) in the signature. Otherwise, OCSP answers<br />

can be stored in their own CredentialObject.<br />

5.3.2 Server-Based Certificate Validation Protocol (SCVP / RFC 5055)<br />

With a server-based certificate validation protocol (SCVP) pursuant to [RFC5055] the tasks necessary<br />

in the scope of the validation of a certificate, which can be very complex under certain circumstances,<br />

can be outsourced to a specialised service. This is sensible when, for example, a complex signature<br />

validation of a component with low computing power (e.g. a mobile terminal) must be carried out. For<br />

these purposes, the SCVP client sends a request to the SCVP server in which, for example, the<br />

certificate to be verified is submitted or otherwise specified. After that, the SCVP server constructs <strong>and</strong><br />

verifies the complete certificate path; in doing so it is supported by the primary revocation information<br />

in the form of OCSP responses or revocation lists, which are typically provided by the issuer of the<br />

certificate.<br />

When the SCVP server is requested, it should be made clear in the wantBack element (in the query<br />

element of the CVRequest) by means of the PID id-swb-pkc-revocation-info that the<br />

corresponding revocation information should be returned. The revocation information returned in the<br />

CVResponse (in the<br />

replyObjects/replyWantBacks/revInfoWantBack/RevocationInfos) should be extracted<br />

<strong>and</strong> saved as an unsigned element in the CMS or XML based signature (see Sections 5.1.1-5.1.2) or<br />

Federal Office for Information Security 57


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

with other signature formats as a separate CredentialObject (see Section 3.6.8.5) so that a<br />

renewed signature verification with any CAdES or XAdES conformant signature application<br />

component is possible.<br />

Additionally, in the case of a CMS or XML based signature, the complete CVResponse can be<br />

deposited in RevocationValues or as a CredentialObject.<br />

5.4 Time Stamp<br />

The Time Stamp Protocol (TSP) pursuant to [RFC3161] should be used in particular 65 for the request<br />

of (qualified) time stamps.<br />

In order to make it easy to verify the time stamp later, the verification of the time stamp should occur<br />

automatically after the generation of the time stamp <strong>and</strong> the end of the so-called “grace period” (see<br />

[ETSI 101733] Section 4.4.2). In doing so, as explained in Section 5.1.1, the certificates used for<br />

verification in the unsigned CertificateValues attribute <strong>and</strong> the revocation information in the<br />

unsigned RevocationValues attribute should be stored.<br />

5.5 Evidence Record)<br />

Pursuant to the Evidence Record Syntax (ERS) St<strong>and</strong>ard of the IETF [RFC4998], an evidence record<br />

is a unit of data with which the existence of saved data <strong>and</strong> documents at a defined point in time can<br />

be technically proven. It includes cryptographic evidence records with which the integrity <strong>and</strong><br />

authenticity of electronically saved data <strong>and</strong> documents can be verified at any time. The ERS st<strong>and</strong>ard<br />

is technically based on the approach that cryptographic checksums (hash values) of the archival<br />

information packages (XAIP documents) are organized in a hash tree (pursuant to Merkle [MER<br />

1980]) when stored in the archive system as cryptographically unique representatives of the data to be<br />

preserved, <strong>and</strong> the roots of the hash tree are secured ("sealed") with a qualified time stamp containing<br />

a qualified electronic signature for proving the integrity (also see <strong>Annex</strong> <strong>TR</strong>-<strong>ESOR</strong>-M.3). This first<br />

time stamp is also designated as the Initial Archive Time Stamp pursuant to the ERS st<strong>and</strong>ard<br />

[RFC4998].<br />

The source of trust for the archival time stamp <strong>and</strong> thus for legally compliant re-signing pursuant to<br />

§17 SigV is the qualified time stamp that contains a qualified electronic signature. Its data structure<br />

should fulfil the requirements of the “Time Stamp Protocol (TSP)” [RFC3161] <strong>and</strong> the “Cryptographic<br />

Message Syntax (CMS)” [RFC5652].<br />

In the case of that a signature or time-stamp renewal is necessary that is sufficient insofar as only the<br />

used digital signature procedure is threatened to lose its suitability as a security message but the hash<br />

algorithm used remains suitable, the new archive time stamp includes the hash value of the original<br />

time stamp in a hash tree that is to be reconstructed with a new qualified time stamp as the conclusion<br />

so that a secure <strong>and</strong> verifiable, chronological chain of evidence made of cryptographically linked<br />

archive time stamps arises. The hereby arising evidence record contains an additional<br />

65 Furthermore, in environments with a high number of necessary individual time stamps, the use of the Archive<br />

Time Stamp (ArchiveTimeStamp) that is based on hash trees <strong>and</strong> st<strong>and</strong>ardised in [RFC4998] or the<br />

construction of so-called "interval-qualified time stamps" explained in [HK 09] is recommended.<br />

58 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

ArchiveTimeStamp element in an ArchiveTimestampChain element pursuant to [RFC4998] that<br />

already existed beforeh<strong>and</strong>.<br />

Insofar as the security suitability of the used hash algorithm is (also) threatened, the hash tree shall be<br />

renewed. In doing so, the Archival Information Package is hashed with a suitable algorithm <strong>and</strong> a new<br />

ArchiveTimestampChain element with a corresponding ArchiveTimeStamp element is inserted<br />

into the ArchiveTimeStampSequence. Additional information can also be found in [RFC4998].<br />

The technical proof of the the maintenance of the integrity <strong>and</strong>, if necessary, the authenticity of the<br />

archival information packages stored in the electronic long-term storage then occurs along with the<br />

presentation of the actual archival data <strong>and</strong> the associated, valid certificates, existing electronic<br />

signatures, <strong>and</strong> in particular the proof of the integrity of the cryptographic representatives of the<br />

Archival Information Package, i.e. the hash values <strong>and</strong> the archive time stamp.<br />

The ERS st<strong>and</strong>ard specifies a so-called Evidence Record for these purposes. This Evidence Record<br />

contains, in particular, a sequence of Archive Time Stamps with which the integrity <strong>and</strong> authenticity of<br />

the Archival Information Package can be proven. An Archive Time Stamp, in turn, contains all of the<br />

necessary data from the hash tree (reducedHashTree) needed for verifying that the Archival<br />

Information Package belongs to the hash tree. The root of the hash tree is furnished with a qualified<br />

time stamp (also see <strong>Annex</strong> <strong>TR</strong>-<strong>ESOR</strong>-M.3).<br />

EvidenceRecord ::= SEQUENCE {<br />

version INTEGER { v1(1) },<br />

digestAlgorithms SEQUENCE OF AlgorithmIdentifier,<br />

cryptoInfos [0] CryptoInfos OPTIONAL,<br />

encryptionInfo [1] EncryptionInfo OPTIONAL,<br />

archiveTimeStampSequence ArchiveTimeStampSequence<br />

}<br />

CryptoInfos ::= SEQUENCE SIZE (1..MAX) OF Attribute<br />

The version field (e.g. v1) describes the current version of the ERS st<strong>and</strong>ard.<br />

The digestAlgorithms field contains a list of all hash algorithms with which hash values were<br />

created for the saved data during the retention period.<br />

The optional cryptoInfos field makes it possible to transport data that were needed for the<br />

validation of the information contained in the archiveTimeStampSequence field.<br />

The encryptionInfo field, which is also optional, includes necessary information on the correct<br />

h<strong>and</strong>ling of encrypted contents.<br />

The archiveTimeStampSequence field contains a sequence of linked archive time stamps that<br />

were generated for the stored data over the course of the retention period.<br />

ArchiveTimeStampSequence ::= SEQUENCE OF ArchiveTimeStampChain<br />

ArchiveTimeStampChain ::= SEQUENCE OF ArchiveTimeStamp<br />

The ArchiveTimeStampChain <strong>and</strong> ArchiveTimeStampSequence are chronologically<br />

ordered based on the time of the final time stamp. All reduced hash trees have the exact same hash<br />

algorithm as their basis within an Archive Time Stamp Chain.<br />

Pursuant to the ERS st<strong>and</strong>ard of the IETF, an Archive Time Stamp is defined as follows:<br />

Federal Office for Information Security 59


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

ArchiveTimeStamp ::= SEQUENCE {<br />

digestAlgorithm [0] AlgorithmIdentifier OPTIONAL,<br />

attributes [1] Attributes OPTIONAL,<br />

reducedHashtree [2] SEQUENCE OF PartialHashtree OPTIONAL,<br />

timeStamp ContentInfo -- TimeStampToken nach [RFC3161]<br />

}<br />

TimeStampToken ::= ContentInfo<br />

-- [RFC3161]<br />

-- contentType is id-signedData ([RFC3852])<br />

-- content is SignedData ([RFC3852])<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The digestAlgorithm field identifies the used hash algorithm. If the field is not present, the ERS<br />

st<strong>and</strong>ard assumes that the hash algorithm of the time stamp was used for the hash value generation.<br />

The optional attributes field can contain additional information on the rules applied for resigning<br />

or the application of the archive time stamp.<br />

The reducedHashtree field contains all hash values that are needed for the mathematical<br />

verification of the hash value nodes into which the original hash value of the Archival Information<br />

Package including the final qualified time stamp.<br />

The timeStamp field contains a qualified time stamp that was generated using a qualified electronic<br />

signature as cryptographic confirmation of the integrity of the data returned with the evidence record.<br />

60 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

6. Definition of a reliable transaction rrotocol<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

The definition of a reliable transaction protocol in this chapter does not elaborate so much on the data<br />

submitted with this protocol, but rather on the technically necessary characteristics of such a protocol.<br />

The data to be submitted arise automatically from the interface specifications in the annexes <strong>TR</strong>-<br />

<strong>ESOR</strong>-S <strong>and</strong> <strong>TR</strong>-<strong>ESOR</strong>-E <strong>and</strong> therefore are not discussed here in more detail. This also includes the<br />

operations that can be executed on the archive, because the corresponding “function requests” are<br />

interpreted as parts of the data to be submitted.<br />

6.1 Derived Requirements<br />

[RFC4810] specifies the requirements of a long-term archive in a very general manner. The following<br />

points can be picked up here for the transaction protocol:<br />

• The archive shall accept all data formats for archiving. Thus, the protocol must be able to<br />

h<strong>and</strong>le all kinds of data.<br />

• Cryptographic additions like signature or time stamps on the documents to be archived can<br />

(but do not have to) exist. Thus, the protocol must be able to h<strong>and</strong>le these additions <strong>and</strong> the<br />

not lose the assignment of the document to the addition.<br />

• Meta data on the documents to be archived can (but do not have to) exist. Thus, the protocol<br />

must be able to h<strong>and</strong>le these additions <strong>and</strong> the not lose the assignment of the document to the<br />

addition.<br />

• The data integrity shall also be protected during transmission.<br />

• The confidentiality shall also be protected during transmission.<br />

• It shall be possible to authenticate requests as well as answers.<br />

• The protocol shall work efficiently <strong>and</strong> reliably for large numbers of information packages.<br />

In addition to these very general requirements, the necessity for supporting asynchronous<br />

communication musters could exist. In this case, the following aspects are to be considered:<br />

(1): The client needs a technical confirmation that his submitted request has arrived at the other entity<br />

at all.<br />

• (2) The actual answer can be submitted much later from the server to the client.<br />

• The confirmation (1) can be omitted if the actual answer (2) is available immediately after the<br />

request.<br />

• A client can make a request several times if the confirmation (1) or the actual answer (2) has<br />

not arrived after a certain period of time. Thus follows: Each transaction needs a unique ID,<br />

■ So that the client can mark the request as a repetition of a request that has already<br />

been made,<br />

■ So that the archive system can recognise a request that has been made multiple times<br />

<strong>and</strong> not execute it multiple times,<br />

■ Because answers to multiple requests can arrive at the client in any sequence <strong>and</strong> the<br />

client must be able to assign the archive transactions to the correponding transactions<br />

in the transaction application.<br />

Federal Office for Information Security 61


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

• The client should be able to request the status of operations that have been requested <strong>and</strong> not<br />

answered yet. Thus follows:<br />

■ The unique transaction ID,<br />

■ All possible conditions of all possible transactions are defined.<br />

• The protocol knows several parties, at least Client <strong>and</strong> Server. More parties are also possible,<br />

e.g. relay or proxy.<br />

6.2 Recommendations for the implementation<br />

Based on the requirements listed above, this section makes recommendations for the manner in which<br />

these requirements should be implemented concretely for the S.4 XML Adapter - ArchiSafe Module<br />

interface. The same procedure can be used for all other interfaces.<br />

(A3.6-2) In order to be able to process any data format <strong>and</strong> to be able to link the cryptographic data<br />

<strong>and</strong> meta data with the payload data, the XAIP container defined in Chatper 3 or a derivative thereof<br />

should be used as the central data element in the protocol.<br />

This means that, especially for the protocol, all data must be kept in a single data element <strong>and</strong> in this<br />

manner be logically connected to each other. The protocol is not responsible for the logical correctness<br />

of this data element after receipt.<br />

(A3.6-3) To protect the integrity <strong>and</strong> the confidentiality during the transmission <strong>and</strong> to authenticate<br />

the requests <strong>and</strong> answers, a TLS tunnel 66 should be constructed with certificate-based authentication on<br />

both sides before any communication between the XML module <strong>and</strong> the ArchiSafe module. Neither<br />

requests nor answers shall be sent through insecure channels. Both the client <strong>and</strong> the server should<br />

ensure this.<br />

(A3.6-4) The TLS tunnel shall ensure the integrity <strong>and</strong> confidentiality of the data transmitted in it<br />

with sufficiently strong cryptographic procedures pursuant to [<strong>TR</strong> 02102]. The archive system shall<br />

enforce this <strong>and</strong> not accept any weak procedure upon establishment of the tunnel.<br />

(A3.6-5) The TLS tunnel shall be maintained for the duration of a transaction at a minimum.<br />

Requests <strong>and</strong> answers to a transaction shall be transmitted through the same TLS tunnel.<br />

(A3.6-6) If a tunnel is disrupted during a transaction for any reason, the client shall not expect any<br />

answer of any kind from the archive system. In this case, the client shall create a new TLS tunnel <strong>and</strong><br />

report the current status or the end of the transaction to the server by means of a status requests.<br />

(A3.6-7) The TLS tunnel should be maintained as long as desired <strong>and</strong> used for any number of<br />

transactions (also parallel).<br />

(A3.6-8) A TLS tunnel can be used for just one transaction <strong>and</strong> can then be terminated. Howover,<br />

this is only advisable if this client <strong>and</strong> the archive system only rarely communicate.<br />

(A3.6-9) A connection oriented protocol (e.g. TCP) shall be chosen as the transmission protocol<br />

within the TLS tunnel. The technical confirmation of the receipt of a client request, among other<br />

things, is realised by means of this protocol.<br />

66 The secure connection can indeed be realised with means other than with a TLS tunnel. For reasons of<br />

simplification, though, merely the “TLS tunnel” or “tunnel” will be referred to in the following.<br />

62 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

(A3.6-10) Building on the TCP protocol, a protocol shall be realised on the application level that<br />

maps the client requests <strong>and</strong> the final archive system answers.<br />

(A3.6-11) The protocol on the application level shall be a protocol without connections in order to<br />

map the asynchronous character.<br />

(A3.6-12) The protocol on the application level must be routing capable in order to take aspects like<br />

relays, load distribution, sessions h<strong>and</strong>ling, etc. into account.<br />

(A3.6-13) Recommendation for the protocol on the application level is SOAP document literal<br />

encoding67 . The external interfaces of all archive system components will be published as WSDLspecification,<br />

which can be based on an external XML schema.<br />

(A3.6-14) The lifecycle model introduced in the previous section shall be completely supported by<br />

the protocol <strong>and</strong> both communication partners. It shall continue to be taken into account that the<br />

archive module can process several (many) transactions - also arising from multiple client applications<br />

- simultaneously. The condition model within the archive-module shall take this into account.<br />

(A3.6-15) The client shall have all data on a transaction available until the transaction has been<br />

completely concluded68 .<br />

Additional information about the reliable execution of an asynchronous protocol can be found, for<br />

example, in [LTAP] or in [OASIS-Async].<br />

67 Literal Encoding uses an XML schema for validating the SOAP data <strong>and</strong> offers significantly better<br />

performance than RPC Encoding, in particular in the case of large payload data (also see [FC 07] p. 76 et.<br />

seq. or http://www-128.ibm.com/developerworks/webservices/library/ws-soapenc).<br />

68 e.g. the Client should not “forget” the XAIP after it was transmitted for the first time, because the client<br />

cannot assume that the XAIP was transmitted correctly.<br />

Federal Office for Information Security 63


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

7. <strong>Annex</strong> - XML Schema Definition<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

64 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

XML basiertes Archivdatenobjekt (XML formatted<br />

Archival<br />

Information Package)<br />

<br />

<br />

<br />

<br />

<br />

<br />

XML basiertes Archiv Information Paket<br />

(Typdefinition)<br />

<br />

<br />

<br />

<br />

<br />

<br />

enthält Informationen über die<br />

logische(n)<br />

Struktur(en) des Archivdatenobjektes<br />

<br />

<br />

<br />

<br />

<br />

<br />

enthält Metainformationen zur<br />

Beschreibung des<br />

Geschäfts- und Archivierungskontextes<br />

der<br />

Inhaltsdaten<br />

<br />

<br />

Federal Office for Information Security 65


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

minOccurs="0"><br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für Inhaltsdaten<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für ContentInfo<br />

<br />

<br />

<br />

<br />

66 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

/><br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für einen Zeiger auf Daten<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für generischen Object Identifier<br />

<br />

<br />

<br />


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

Typdefinition für einen beliebigen Bezeichner<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typinformation für Zeitangabe<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für TrackingInfo<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für strukturierte (XML) Daten<br />

<br />

<br />

<br />

68 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

kann.<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für eine ArchiveInfo<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Explizites ArchiveToken-Element, das in<br />

Schnittstellenspezifikation referenziert werden<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für den Package Header des XAIP<br />

<br />

<br />

<br />

<br />

<br />

<br />

Federal Office for Information Security 69


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

durch das Archivsystem oder die<br />

erzeugtes, eindeutiges<br />

Identifikationsmerkmal<br />

<br />

<br />

<br />

<br />

<br />

<br />

Name, Version des XML Schemas<br />

<br />

<br />

<br />

<br />

<br />

<br />

zusätzliche Verständnisinformtionen im<br />

Textformat<br />

<br />

<br />

<br />

<br />

<br />

<br />

Inhaltsverzeichnis<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für eine Package Info Unit<br />

70 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

Klassifikationsmerkmal<br />

<br />

<br />

<br />

<br />

<br />

<br />

Textfeld zur Beschreibung<br />

<br />

<br />

<br />

<br />

<br />

<br />

Referenz auf Metadatenobjekt<br />

<br />

<br />

<br />

<br />

<br />

<br />

Referenz auf beweisrelevante Daten<br />

(kryptographische Sicherungsmittel)<br />

<br />

<br />

<br />

<br />

<br />

Federal Office for Information Security 71


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

zu<br />

<br />

<br />

<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

Typdefinition für ein Inhaltsverzeichnis (Manifest)<br />

einem XAIP<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Aufbewahrungsfristen<br />

<br />

<br />

<br />

<br />

<br />

<br />

Informationen über den "Absender" des<br />

Archivdatenobjektes<br />

<br />

<br />

<br />

<br />

<br />

<br />

das Inhaltsverzeichnis kann ein oder<br />

mehrere<br />

"Kapitel" oder wieder ein erneutes<br />

Unterverzeichnis enthalten<br />

72 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für die Submissionsinformationen<br />

<br />

<br />

<br />

<br />

<br />

<br />

Identifikationsmerkmal für die<br />

aufrufende<br />

Geschäftsanwendung<br />

<br />

<br />

<br />

<br />

<br />

<br />

versendende Organisationseinheit<br />

<br />

<br />

<br />

<br />

<br />

<br />

Autor, resp. Absender (Ersteller)<br />

<br />

<br />

<br />

Federal Office for Information Security 73


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

Versendezeitpunkt<br />

<br />

<br />

<br />

<br />

<br />

<br />

Informationen zur Authentifikation der<br />

Kommunikation<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

/><br />

<br />

<br />

<br />

Typdefinition für ein Metadatenobjekt<br />

<br />

<br />

<br />

<br />

<br />

<br />


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

Txpdefinition für den Metadatenabschnitt<br />

<br />

<br />

<br />

<br />

<br />

<br />

Metainformationen zu einem oder mehreren<br />

Inhaltsdatenobjekten<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für CheckSum<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für ein Nutzdatenobjekt<br />

Federal Office for Information Security 75


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Inhaltsdaten<br />

vor der<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

kryptographische Prüfsumme über die<br />

<br />

<br />

<br />

<br />

<br />

<br />

Information über auf den Inhaltsdaten<br />

Speicherung ausgeführte Operationen<br />

(Transformationen)<br />

<br />

<br />

<br />

<br />

<br />

76 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

Typdefinition für den Nutzdatenabschnitt<br />

<br />

<br />

<br />

<br />

<br />

<br />

ein oder mehrere Inhaltsdatenobjekte<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für Transformationsinformationen<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für Transformationoperationen (objekte)<br />

<br />

<br />

<br />

<br />


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

maxOccurs="1" minOccurs="0" /><br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für Algorithmenbezeichner<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für St<strong>and</strong>ard OCSP Antwort<br />

<br />

<br />

<br />

<br />

78 Federal Office for Information Security


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für die Beweisdaten (Signaturen,<br />

Zeitstempel)<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Typdefinition für eine Beweisdatenhülle<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Federal Office for Information Security 79


<strong>BSI</strong> <strong>TR</strong>-<strong>ESOR</strong>-F<br />

<strong>Formats</strong> <strong>and</strong> Protocols<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

80 Federal Office for Information Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!