18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3. Authorization Constraints<br />

Paper documents have authorization constraints regarding the signatories specified directly<br />

in the document’s text. This is done by specifying signatories’ names or roles<br />

directly un<strong>de</strong>r the signature field. In a similar way, these constraints can also be inclu<strong>de</strong>d<br />

in the contents of an electronic document. Unfortunately, this poses a big challenge to<br />

automated validation of the authorization constraints. We further discuss this challenge<br />

in Section 5.<br />

Another approach consists of including signature authorization requirements in<br />

the document’s un<strong>de</strong>rlying structure. For this to be possible, the document’s format <strong>de</strong>finition<br />

must contain clear specifications of the fields in which those requirements shall<br />

be inclu<strong>de</strong>d. They must also specify the syntax and interpretation characteristics of the<br />

requirements. However, different organizations may have control over the <strong>de</strong>finition of<br />

different document formats. This implies that the way document formats specify signature<br />

authorization requirements may differ dramatically from one another.<br />

The Portable Document Format (PDF), <strong>de</strong>fined in ISO 32000-1<br />

[Adobe Systems Incorporated 2008], is an example of a document format that already<br />

provi<strong>de</strong>s a specification for signature authorization requirements. This consists of<br />

an internal structure called seed value dictionary. As <strong>de</strong>scribed in clause 12.7.4.5 of ISO<br />

32000-1, the seed value dictionary’s entries “provi<strong>de</strong> constraining information that shall<br />

be used at the time the signature is applied.”<br />

One of the possible entries in a seed value dictionary that is relevant for authorization<br />

purposes is the Cert entry. This entry contains a certificate seed value dictionary,<br />

which, in turn, contains information regarding certificates that shall be used when signing.<br />

Table 235 of ISO 32000-1 lists all possible entries in a certificate seed value dictionary.<br />

These entries provi<strong>de</strong> numerous ways of filtering acceptable signing certificates. Due to<br />

the goals of this paper, we only refer to the <strong>de</strong>scriptions of the Subject and SubjectDN<br />

entries.<br />

Subject: “An array of byte strings containing DER-enco<strong>de</strong>d X.509v3 certificates<br />

that are acceptable for signing.”[Adobe Systems Incorporated 2008]. This entry, then,<br />

enables the document’s author to specify unequivocally the i<strong>de</strong>ntities of the acceptable<br />

signatories based on their PKCs.<br />

SubjectDN: “An array of dictionaries, each specifying a Subject Distinguished<br />

Name (DN) that shall be present within the certificate for it to be acceptable for<br />

signing. The certificate ultimately used for the digital signature shall contain all<br />

the attributes specified in each of the dictionaries in this array. (PDF keys and<br />

values are mapped to certificate attributes and values.) The certificate is not constrained<br />

to use only attribute entries from these dictionaries but may contain additional<br />

attributes”[Adobe Systems Incorporated 2008]. This entry is effectively more flexible<br />

than the Subject entry. It still allows constrains over the signatory’s i<strong>de</strong>ntity, for example<br />

by specifying the expected value of the common name field in the certificate’s Subject DN.<br />

But it also brings the possibility of constraining acceptable signing certificates by other<br />

attributes. These attributes may refer, for example, to authorization cre<strong>de</strong>ntials, such as<br />

roles or group memberships. In other words, it is possible to constrain acceptable signing<br />

certificates just by specifying attributes that shall be present in these PKCs.<br />

399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!