<?xml version="1.0"?>
<issues xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2003/10/issues" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="   http://www.w3.org/2003/10/issues   http://dev.w3.org/cvsweb/~checkout~/2002/issues/schema/issues.xsd">
  <header>
    <title>XKMS Ver. 2 Candidate Recommendation Issues</title>
    <version>$Date: 2005/06/23 13:48:57 $</version>
    <pubdate>2015-31-12</pubdate>
    <publoc>
      <loc xlink:type="simple"
      xlink:href="http://www.w3.org/2001/XKMS/Drafts/cr-issues/">http://www.w3.org/2001/XKMS/Drafts/cr-issues/</loc>
    </publoc>
    <latestloc>
      <loc xlink:type="simple"
      xlink:href="http://www.w3.org/2001/XKMS/Drafts/cr-issues/">http://www.w3.org/2001/XKMS/Drafts/cr-issues/</loc>
    </latestloc>
    <authlist>
      <author>
        <name>XKMS Working Group</name>
        <uri xlink:type="simple" xlink:href="http://www.w3.org/2001/XKMS/"/>
      </author>
    </authlist>
    <abstract>
      <p>This is the Disposition of Comments for the Candidate Recommentation XKMS Working Drafts:</p>
      <p>
          <loc xlink:href="http://www.w3.org/TR/2004/CR-xkms2-20040405/">
	  XML Key Management Specification (XKMS) Version 2.0
         </loc>
     </p>
      <p>
          <loc xlink:href="http://www.w3.org/TR/2004/WD-xkms2-bindings-20040405/">
          XML Key Management Specification (XKMS) Version 2.0 Bindings
         </loc>
     </p>
    </abstract>
  </header>
  <body>
<!--Add your issues here-->

<issue id="313-tl-1" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Innacurate examples of key derivations in Appendix C</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Apr/0003.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-04-07</date>
<description>
<p>
Appendix C of the XKMS Version 2 Candidate Recommendation, entitled Sample 
Protocol Exchanges, contains examples of key derivations, some of which 
appear not to be accurate.  I enclose my suggested corrections below.</p>

<p>Section 8.1 (Use of Limited-Use Shared Secret Data) says that "All space and 
control characters are removed." Given sections C.1.2 and C.1.3, this 
suggests that a hyphen is a control character. For
the sake of clarity I propose using "punctuation characters" instead of or 
in addition to "control characters".</p>

<p>Also, it might be more appropriate to call the derived quantities "Secret 
Keys" as opposed to "Private Keys".</p>

<eg>
C.1.2 Bob Registration Authentication Key
Authentication Data
3N9CJ-JK4JK-S04JF-W0934-JSR09-JWIK4
Converted Authentication Data
[33][6e][39][63][6a][6a][6b][34] [6a][6b][73][30][34][6a][66][77] 
[30][39][33][34][6a][73][72][30]
[39][6a][77][69][6b][34]
Key = HMAC-SHA1 (Converted Authentication Data, 0x1)
[92][33][7c][7c][3e][8d][3b][7a] [cf][11][59][89][36][64][56][69] 
[95][4f][8f][d7]
</eg>

<eg>
C.1.3 Bob Registration Private Key Encryption
Authentication Data
3N9CJ-K4JKS-04JWF-0934J-SR09JW-IK4
Converted Authentication Data
[33][6e][39][63][6a][6b][34][6a] [6b][73][30][34][6a][77][66][30] 
[39][33][34][6a][73][72][30][39] [6a][77][69][6b][34]
First Block = HMAC-SHA1 (Converted Authentication Data, 0x4)
[78][f1][e7][b1][b3][fd][0c][bc] [96][04][e7][01][4f][33][78][d3] 
[0b][c8][5f][bd]
Key = First Block XOR 0x4
[7c][f1][e7][b1][b3][fd][0c][bc] [96][04][e7][01][4f][33][78][d3] 
[0b][c8][5f][bd]
Second Block = HMAC-SHA1 (Converted Authentication Data, Key)
[1e][7f][e1][b0][ab][d0][f8][09] [2e][28][f3][9d][14][a8][d0][83] 
[2e][ab][ea][22]
Final Private Key
[78][f1][e7][b1][b3][fd][0c][bc] [96][04][e7][01][4f][33][78][d3] 
[0b][c8][5f][bd][1e][7f][e1][b0]
</eg>

<eg>
C.1.4 Bob Recovery Private Key Encryption
Authentication Data
A8YUT vuhhu c9h29 8y43u h9j3i 23
Converted Authentication Data
[61][38][79][75][74][76][75][68] [68][75][63][39][68][32][39][38] 
[79][34][33][75][68][39][6a][33] [69][32][33]
Private Key
[91][8c][67][d8][bc][16][78][86] [dd][6d][39][19][91][c4][49][6f] 
[14][e2][61][33][6c][15][06][7b]
</eg>

<p>
C.2.1 Alice Pass Phrase Computation</p>

<p>The values are correct, but the lines</p>
<eg>
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x1)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x2
</eg>

<p>should read</p>
<eg>
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x2)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x3)
</eg>

<p>
C.2.2 Bob Pass Phrase Computation</p>

<p>The values are correct, but the lines</p>
<eg>
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x1)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x2
</eg>

<p>should read</p>
<eg>
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x2)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x3)
</eg>
</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>
      <decided disposition='agreed' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004May/0025.html">
          <date>2004-05-24</date>
          <description>
            <p>
	    The proposed corrections were made to the Editor's draft.
            </p>
          </description>
          <decision>

      <announced xlink:type='simple'
	        xlink:href="http://www.w3.org/2002/02/mid/20041012124132.GB1486@inrialpes.fr">
	  <date>2004-10-12</date>
      </announced>	  

          </decision>
        </decided>
</transitions>
</issue>

<issue id="313-tl-2" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Use of "Secret Key" term rather than "Private Key" in Appendix C</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Apr/0003.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-04-07</date>
<description>
<p>
Appendix C of the XKMS Vesion 2 Candidate Recommendation, entitled Sample 
Protocol Exchanges, contains examples of key derivations.</p>
<p>It might be more 
appropriate to call the derived quantities "Secret 
Keys" as opposed to "Private Keys".</p>
</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

      <decided disposition='agreed' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004May/0025.html">
          <date>2004-05-24</date>
          <description>
            <p>
	    The proposed corrections were made to the Editor's draft. 
            </p>
          </description>
      <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041012124132.GB1486@inrialpes.fr'>
	  <date>2004-10-12</date>
     </announced>	  
    </decision>
   </decided>

</transitions>
</issue>

<issue id="314-tl-1" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Error in Section C.2.2</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Apr/0004.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-04-08</date>
<description>
<p>
There is another error in Section C.2.2 that  I missed:</p>
<p>This line:</p>
<eg>
Base 64 Encoding of Pass Phrase Stage 1
    PHx8li2SUhrJv2e1DyeWbGbD6rs=
</eg>
<p>should read:</p>
<eg>
Base 64 Encoding of Pass Phrase Stage 1
    8GYiVK8zBD5E0q9Rq2Y/Gci0Zpo=
</eg>
</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>
      <decided disposition='agreed' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004May/0025.html">
          <date>2004-05-24</date>
          <description>
            <p>
	    The proposed corrections were made to the Editor's draft. 
            </p>
          </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href="http://www.w3.org/2002/02/mid/20041012124752.GC1486@inrialpes.fr">
	  <date>2004-10-12</date>
     </announced>	  
    </decision>

        </decided>
</transitions>
</issue>

<issue id="315-ga-1" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Misplaced definition of "RequestSignatureValue"</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/public-xkms-comments/2004Apr/0003.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-03-22</date>
<description>
<p>
There is a part of the Schema defining "RequestSignatureValue" 
element in the Compound Request Section (par[127]) which I think it 
should appear before the beginning of this section, in par[126].
</p>
<p>
<loc
xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS20030826/xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS20030826/xkms-part-1.html</loc></p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:GUILLERMOALVARO@terra.es">Guillermo Alvaro</originator>
</decided>
      <decided disposition='agreed' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004May/0025.html">
          <date>2004-05-24</date>
          <description>
            <p>
	    The proposed corrections were made to the Editor's draft. 
            </p>
          </description>
          <decision>
      <announced xlink:type='simple'
      xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004May/0025.html">
	  <date>2004-05-24</date>
     </announced>	  
          </decision>
        </decided>
</transitions>
</issue>

<issue id="315-ga-2" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Double definition of "ResponseId" attribute</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/public-xkms-comments/2004Apr/0003.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-03-22</date>
<description>
<p>
In the definition of the "StatusRequest" element (par[132]) it is 
said that it inherits the element attributes of "PendingRequestType", 
and the same can be understood from the Schema. However, 
the "ResponseId" attribute -which is already part 
of "PendingRequestType"- is defined there. To make it more confusing 
it is said to be Optional whereas in "PendingRequestType" it was 
Required. Should this reference be removed from there?</p>

<p>
<loc
xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS20030826/xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS20030826/xkms-part-1.html</loc></p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:GUILLERMOALVARO@terra.es">Guillermo Alvaro</originator>
</decided>

      <decided disposition='agreed' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004May/0025.html">
          <date>2004-05-24</date>
          <description>
            <p>
	    The proposed corrections were made to the Editor's draft.
            </p>
          </description>
          <decision>
      <announced xlink:type='simple'
	        xlink:href="http://www.w3.org/2002/02/mid/20040706051828.58262.qmail@web51506.mail.yahoo.com
">
	  <date>2004-07-05</date>
      </announced>	  
          </decision>
        </decided>

</transitions>
</issue>

<issue id="315-ga-3" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Typo in example</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/public-xkms-comments/2004Apr/0003.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-03-22</date>
<description>
<p>
Maybe this is not so important, but in the Data Encryption Example 
(par[146]) a key is bound to bob @ "example.com" but then in par[147] 
the name used is bob @ "bobcorp.test". Of course the example is 
perfectly understandable but maybe both paragraphs should be 
consistent.
</p>
<p>
<loc
xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS20030826/xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS20030826/xkms-part-1.html</loc></p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:GUILLERMOALVARO@terra.es">Guillermo Alvaro</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com'>
    <date>2004-11-29</date>
    <description>
      <p>
        Typo in example - Complete fixed para [146].
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216154351.45414.qmail@web51505.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
    </decision>
 </decided>

</transitions>
</issue>


<issue id="316-bl-1" type="clarification" xmlns="http://www.w3.org/2003/10/issues">
<title>Multiple answers for a QueryKeyBinding with both KeyInfo and UseKeyWith elements?</title>
<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0018.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-06-21</date>
<description>
<p>
If I have a QueryKeyBinding with both a KeyInfo and a set of
UseKeyWith elements, and the two constructs refer to different keys (or
sets of keys), I assume the resultant response is implementation
dependant?  (I.e. union vs. intersection of keys found under the two
sets of conditions.)
</p>
</description>
<originator xlink:type="simple"
xlink:href="mailto:berin@wingsofhermes.org">Berin Lautenbach</originator>
</decided>

 <decided disposition='declined' xlink:type='simple' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0026.html">
    <date>2004-06-23</date>
    <description>
      <p>
This issue is deliberately not addressed. Do let us know if this causes any implementation
problems in your code.
      </p>
<p>
Stephen Farrell: I can imagine the union vs. intersection result being influenced
by who's asking, from where, about whom, with which UseKeyWith, etc.
I could also imagine a responder treating all such cases as an error
for validate and doing a union for locate!
</p>

   </description>

   <decision>
      <announced xlink:type='simple'
	        xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0026.html">
	  <date>2004-06-23</date>
      </announced>	  

<acknowledged disposition='agreement'
	      xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0027.html">
	      <date>2004-06-23</date>
	      <description>

<p>And I don't think it causes implementation problems, other than
looking at how to code in the flexibility to allow a user to make the
choice.  If worst comes to worst we can always make a decision to go
one way or t'other.</p>

<p>I did have one potential niggle that concerned me from an interop
perspective on the second issue.  If a client sends out a request with
a particular set of UseKeyWith elements and receives back a response
with a superset of those original elements, it *might* cause confusion
if the client is only expecting a subset of what it asked for.  (I
think it would have to be a fairly naive implementation, thus only
mild concern.)</p>

</description>
              <originator xlink:type="simple"
xlink:href="mailto:berin@wingsofhermes.org">Berin Lautenbach</originator>

</acknowledged>

    </decision>
</decided>


</transitions>
</issue>

<issue id="316-bl-2" type="clarification" xmlns="http://www.w3.org/2003/10/issues">
<title>Multiple answers for a QueryKeyBinding with a single UseKeyWith item?</title>
<transitions>

<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0018.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-06-21</date>
<description>
<p>
If I have a QueryKeyBinding with a UseKeyWith item, and there are
actually multiple applications defined for the key that is found, should
the LocateResult have all the potential applications defined in the
response UseKeyWith items, or just the intersection between those
originally requested and the full list?  (Again, I assume application
dependant?)
</p>
<eg>
For example, the request was &lt;xkms:UseKeyWith Application="uri1" Identifier="berin"/&gt;

Is the result

&lt;xkms:UnverifiedKeyBinding&gt;
&lt;ds:KeyInfo&gt;...&lt;/ds:KeyInfo&gt;
&lt;xkms:UseKeyWith Application="uri1" Identifier="berin"/&gt;
&lt;/xkms:UnverifiedKeyBinding&gt;

or

&lt;xkms:UnverifiedKeyBinding&gt;
&lt;ds:KeyInfo&gt;...&lt;/ds:KeyInfo&gt;
&lt;xkms:UseKeyWith Application="uri1" Identifier="berin"/&gt;
&lt;xkms:UseKeyWith Application="uri2" Identifier="berin"/&gt;
&lt;/xkms:UnverifiedKeyBinding&gt;
</eg>
</description>

<originator xlink:type="simple"
xlink:href="mailto:berin@wingsofhermes.org">Berin Lautenbach</originator>
</decided>

 <decided disposition='declined' xlink:type='simple' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0026.html">
    <date>2004-06-23</date>
    <description>
      <p>
This issue is deliberately not addressed by the XKMS specification. Do let us know if this 
causes any implementation problems in your code.
      </p>
      <p>
Some keys can be shared across applications (e.g. S/MIME
and TLS client auth), others might be mandated not to be so shared
e.g. a VPN or SET cert (ok ignoring that SET is kind of dead-ish, but
it did specifically mandate that its certs not be used for other
apps.)
</p>
   </description>

   <decision>
      <announced xlink:type='simple'
	        xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0026.html">
	  <date>2004-06-23</date>
      </announced>	  

<acknowledged disposition='agreement'
	      xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0027.html">
	      <date>2004-06-23</date>
	      <description>

<p>And I don't think it causes implementation problems, other than
looking at how to code in the flexibility to allow a user to make the
choice.  If worst comes to worst we can always make a decision to go
one way or t'other.</p>

<p>I did have one potential niggle that concerned me from an interop
perspective on the second issue.  If a client sends out a request with
a particular set of UseKeyWith elements and receives back a response
with a superset of those original elements, it *might* cause confusion
if the client is only expecting a subset of what it asked for.  (I
think it would have to be a fairly naive implementation, thus only
mild concern.)</p>

</description>

              <originator xlink:type='simple'
xlink:href="mailto:berin@wingsofhermes.org">Berin Lautenbach</originator>

</acknowledged>

    </decision>
 </decided>

</transitions>

</issue>

<issue id="317-bl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Make a requirement that  signatures in a message actually refer to the XKMS content</title>
<transitions>

<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0028.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-06-23</date>
<description>
<p>
I assume there is a requirement on implementations to ensure that the
signature(s) in a message actually refer(s) to the XKMS content.  That's
probably pretty obvious, but I can see some fairly trivial attacks
against implementations that just check a signature is valid without
ensuring that the reference actualy refers to the XKMS message.</p>
<p>
Is this something worth mentioning in the security section?
</p>
</description>
<originator xlink:type="simple"
xlink:href="mailto:berin@wingsofhermes.org">Berin Lautenbach</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0029.html">
    <date>2004-06-23</date>
    <description>
      <p>
      Yes it should be mentioned if its not, so best is probably
to add this to the issues list so it gets properly checked.
      </p>
     <p>Section 10.11 was added to the spec, with the following text:</p>
<p>The Implementation of XKMS MUST check for signature value reference in the to-be-signed data when using a signed SOAP message. Also, Implementations MUST ensure that all bytes in the XKMS messages ex. from <locate> .... </locate> must be included in hashing and in the resulting signature value of the message.</p>
   </description>
    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://lists.w3.org/Archives/Public/www-xkms/2004Oct/0090.html'>
	  <date>2004-10-25</date>
     </announced>
    </decision>
 </decided>


</transitions>

</issue>

<issue id="318-tl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Missing RSAKeyPair element in the XKMS schema</title>
<transitions>

<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0034.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-06-30</date>
<description>
<p>
Section 8.2.1 of Part 1 of the XKMS spec covers an element &lt;RSAKeyPair&gt;
intended
to carry public and private parameters of an RSA key pair.</p>

<p>However, the adjoining schema fragment (as well as the complete XKMS schema)
does not define this element. Instead it defines another element,
&lt;RSAKeyValue&gt;.</p>

<p>RSAKeyPair appears more appropriate for the intended purpose, so I'd favor a
schema update, assuming this is not too late.</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

 <decided disposition='accepted' xlink:type='simple' xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jun/0035.html">
    <date>2004-06-30</date>
    <description>
      <p>
There is also a ds:RSAKeyValue in dsig so we don't want to
reuse that element name either. I'd agree that we should
change to properly use RSAKeyPair in the spec and schema,
which is, as you point out, a substantive, though v. small,
change to the schema.</p>

<p>There're associated changes required in the examples at the
end of section 6.4 and in C.3.1, C.3.2 and C.3.3. Those
should get caught as part of our "PR spec will contain samples
actually used in interop" approach.</p>

   </description>
 </decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://lists.w3.org/Archives/Public/www-xkms/2004Oct/0091.html'>

    <date>2004-10-25</date>
    <description>
      <p>
	The proposed corrections were made to the Editor's draft.
      </p>
   </description>
    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://lists.w3.org/Archives/Public/www-xkms/2004Oct/0091.html'>
	  <date>2004-10-24</date>
     </announced>	  
    </decision>

 </decided>

</transitions>

</issue>


<issue id="319-bl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Enumerations in schema</title>

<transitions>

<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0004.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-04</date>
<description>
<p>
Am not sure if this has been raised before, but I've been playing with 
schema validation of the various messages and have run into a problem 
with Xerces rejecting messages because of the (amongst others) KeyUsage 
Elements.  In particular, the schema defines the KeyUsageType 
enumeration as follows :
</p>

<eg>
&lt;simpleType name="KeyUsageType">
&lt;restriction base="QName">
&lt;enumeration value="xkms:Encryption"/>
&lt;enumeration value="xkms:Signature"/>
&lt;enumeration value="xkms:Exchange"/>
&lt;/restriction>
&lt;/simpleType>
</eg>

<p>I'm not a huge expert in XMLSchema, but my understanding is that 
enumeration values are literal.  So if I use a different qualifier (or 
even no qualifier) it will fail strict validation.</p>

<p>E.g. the snippet</p>

<eg>
&lt;xk:KeyUsage 
xmlns:xk="http://www.w3.org/2002/03/xkms#">xk:Signature&lt;/xk:KeyUsage>
</eg>

<p>will fail, whereas</p>

<eg>
&lt;xk:KeyUsage 
xmlns:xkms="http://www.w3.org/2002/03/xkms#">xkms:Signature&lt;/xkms:KeyUsage>
</eg>

<p>will succeed.</p>

<p>I think KeyBindingStatus will also have the same problem.</p>

<p>Am I misunderstanding XMLSchema?  If not - do we really need to 
enumerate these values in the schema?</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:berin@wingsofhermes.org">Berin Lautenbach</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041006015341.95355.qmail@web51507.mail.yahoo.com">
    <date>2004-10-05</date>
    <description>
      <p>

        The Editor's draft of the XKMS schema was updated to use open
        enumerations and the QNames were changed to URI values. The
        open enumeration technique is described in <loc
        xlink:href="http://lists.oasis-open.org/archives/wss/200402/msg00011.html">
        http://lists.oasis-open.org/archives/wss/200402/msg00011.html</loc>. The
        rationale for the change is given at <loc
        xlink:href="http://www.w3.org/2001/tag/doc/qnameids.html#sec-archrec">
	http://www.w3.org/2001/tag/doc/qnameids.html#sec-archrec</loc>
      </p>
    </description>


    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041012151329.GF1486@inrialpes.fr'>
	  <date>2004-10-12</date>
     </announced>	  
    </decision>

 </decided>

</transitions>
</issue>

<issue id="320-tl-1" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 1</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [179] refers to TemplateKeyBinding; shouldn't this be
PrototypeKeyBinding?
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href=''>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-2" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 1</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [115], "nonce attribute" should be "Nonce attribute".
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-3" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 1</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [193], "both elements" should be "both attributes".
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-4" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 1</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [149], the text states that KeyName and KeyValue are
  requested however in [150] only KeyValue is actually specified
  in request.
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft. KeyName was droped from p. [149].
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-5" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 1</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [109] 3.2.4 Element &lt;PendingNotification>
  Table has a column URI; use Mechanism instead?
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-6" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 2</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Part-2, paragraph [50] LocateRequest message contains invalid Respondwith
  value &lt;RespondWith>Multiple&lt;/RespondWith>.
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	 The line was suppressed from the example.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-7" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 2</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [67] "with a value of true" should be "with a value of 1".
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-8" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 2</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
Paragraph [68] SOAP 1.1 namespace URI in message should be
  <loc xlink:href="http://schemas.xmlsoap.org/soap/envelope/">http://schemas.xmlsoap.org/soap/envelope/</loc>.
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="320-tl-9" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Editorial fixes for XKMS Spec. Part 2</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0010.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
The SOAP 1.2 namespace URI refers to a working draft
  [http://www.w3.org/2002/06/soap-envelope] through out.
  Shouldn't this be <loc xlink:href="http://www.w3.org/2003/05/soap-envelope">http://www.w3.org/2003/05/soap-envelope</loc> ?
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr">
    <date>2004-10-13</date>
    <description>
      <p>
     	    The proposed corrections were made to the Editor's draft.
      </p>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013151748.GA6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>
</transitions>

</issue>

<issue id="321-tl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Order of sign and encrypt</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Jul/0035.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-07-05</date>
<description>

<p>
RegisterResult and RecoverResult may both contain signatures over encrypted
data, however the order of these operations is not explicitly stated in the 
spec.</p>

<p>Given the PrivateKey schema fragment, I'm inclined to draw the conclusion 
that
only encrypt-then-sign is required.  Is this the intention and if so does 
this warrant
a clarifying statement to that effect?</p>

<p>Speculation:</p>

<p>I believe the (un-encrypted) RSAKeyPair is deliberatly omitted from 
PrivateKey so
as to *allow* implementations to mitigate the risk of disclosure of 
sensitive stuff
through, say, the use of special purpose cryptographic hardware that, apart 
from their
primary purpose, also can be programmed to extract the private key 
components from the
surface syntax of an RSAKeyPair element.  I imagine that this design *could* 
stand in the way
of supporting sign-then-encrypt in XKMS  - assuming that 
generating/verifying an enveloped
signature is performed over a schema valid document, which is the only way I 
have explored.
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='agreed' xlink:href="http://www.w3.org/2002/02/mid/20041012154603.99604.qmail@web51505.mail.yahoo.com">
    <date>2004-10-12</date>
    <description>
      <p>
        A new paragraph was added to the specification to remove the ambiguity:
      </p>
<eg>
[372a]Implementations supporting encryption of Private Key Data MUST support Shared Secret. Use of Shared Secret is detailed in section 8.1.
</eg>
    </description>

    <decision>
      <announced xlink:type='simple'
	        xlink:href='http://www.w3.org/2002/02/mid/20041013155227.GC6298@inrialpes.fr'>
	  <date>2004-10-13</date>
     </announced>	  
    </decision>

</decided>

</transitions>

</issue>

<issue id="322-tl" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Compound messaging spec and schema inconsistency</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0052.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-09-28</date>
<description>

<p>
In the process of trying to get my head around the compound messaging
and I discovered what I believe is an inconsistency in the spec.</p>

<p>The last sentence in Section 2.8, which goes like this:</p>

<p>"Alternatively a client MAY issue a compound request containing
multiple inner pending requests corresponding to requests which were
originally made independently."</p>

<p>is in conflict with both the schema and also with text elsewhere in
the spec - PendingRequests's are not allowed in a CompoundRequest.</p>

<p>If this feature is required then the schema needs to be updated
otherwise we'll get away with removing the offending sentence.</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com'>
    <date>2004-11-29</date>
    <description>
      <p>
Deleted last sentence in para[83].
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216154534.21065.qmail@web51504.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
    </decision>
 </decided>

</transitions>

</issue>

<issue id="323-ga" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>StatusResult atts</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0015.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-09-03</date>
<description>

<p>
In the section 3.5.2 of the spec [1] (Element &lt;StatusResult&gt;), p[134],
there are explanations about three attributes (Success, Failed and
Pending) and what do they mean in the case of a *compound request*.
Nothing is stated about a simple request scenario. As I understand it, a
code of Success="1" or Failed="1" or Pending="1" would be returned, but
maybe a bit of clarification would be appreciated. </p>

<p>[1]<loc
xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc></p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:GUILLERMOALVARO@terra.es">Guillermo Alvaro</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com'>
    <date>2004-11-29</date>
    <description>
      <p>
      Modified p. [134] in Section 3.5.2 to describe the ResultType attributes for non-compound
      requests. That is, {Success, Failed, Pending} describe in this case the status of the 
      request operation that has completed and are indicated in the ResultMajor attribute.
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216154738.13815.qmail@web51509.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
    </decision>
 </decided>

</transitions>

</issue>

<issue id="324-tl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>RespondWith and OCSP</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Aug/0021.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-08-31</date>
<description>

<p>
I understand the RequestAbstractType.RespondWith elements indicate what data 
items the requestor is interested in receiving in a result message and that 
a service is encouraged to honor these indications to the best of its 
ability.</p>

<p>Section 3.2.3 Element &lt;RespondWith&gt; has a table that is pretty much clear 
except for the row that contains the following:</p>

<p>OCSP &lt;ds:X509Data&gt; PKIX OCSP token that validates an X509v3 certificate that 
authenticates the key</p>

<p>If the "PKIX OCSP token" is a quantity that the service is meant to Respond 
With then what form does it take?</p>

<p>If the intent is to communicate a DER encoded OCSP ASN.1 type back to the 
requestor, should that not be specified in XKMS along with the markup that 
would carry it - presumably a new ds:X509DataType element of type 
base64Binary?</p>

<p>Or should this row be in the forementioned table in the first place?</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

<decided disposition='accepted' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/41A35D50.1020008@cs.tcd.ie" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-11-23</date>
<description>

<p>There's and open action [1] on me to check in various
places as to whether there ought to be a new ds:KeyInfo
option which could contain OCSP responses.</p>

<p>Instead of doing that, I'd like to propose that for the
purposes of XKMS, we remove the offending text, and thus
offer no explicit support for returning OCSP status
information in XKMS responses.</p>

<p>Two reasons:</p>
<p>a) I don't believe anyone's really depending on this,
since the xkms response itself can effectively give
the same information, but more directly, and with
probably equivalent security (if the XKMS responder
is going to cheat on you, it can probably set things
up so you'll swallow a bogus OCSP response by first
feeding you a bogus caCert)</p>

<p>b) I believe that consulting with PKIX and others,
might take a long time to produce a result, and in any
case, the PKIX folks are mainly taken up with revising
rfc3280 these days, so the chances of the topic getting
serious consideration are perhaps slim.</p>

<p>So, I propose we resolve the issue by removing mention
of xkms responses containing OCSP responses. That means
removing the OCSP row of the table in #3.2.3 and the
related line of schema (an enumeration, so no impact
elsewhere).</p>

<p>[1] <loc xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0014.html">http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0014.html</loc>
</p>

</description>
<originator xlink:type="simple"
xlink:href="mailto:stephen.farrell@cs.tcd.ie">Stephen Farrell</originator>
</decided>

<decided disposition='agreed' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com">
<date>2004-11-29</date>
<description>

<p>Removed the OCSP row of the table in #3.2.3 and the related line
of schema - fixed para [104] and [106] and updated schema.
</p>
</description>
   <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216154937.53848.qmail@web51506.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
    </decision>
</decided>

</transitions>

</issue>

<issue id="325-ga" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Unbounded or Opaque (Client) Data</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0001.html" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-08-31</date>
<description>

<p>Following our client-server tests Tommy and myself were discussing about
the number of OpaqueData elements that the specification *intend* to
allow in an OpaqueClientData element.</p>

<p>It seems that the way the schema currently stands multiple OpaqueData
children are allowed for a OpaqueClientData element,</p>
<eg>
        &lt;sequence maxOccurs="unbounded"&gt;
           &lt;element ref="xkms:OpaqueData" minOccurs="0"/&gt;
        &lt;/sequence&gt;
</eg>
<p>, but currently only the first one is handled by Tommy's implementation
and so we would like to get confirmation that that's not the expected
behaviour.</p>
</description>
<originator xlink:type="simple"
xlink:href="mailto:GUILLERMOALVARO@terra.es">Guillermo Alvaro</originator>
</decided>


<decided disposition='accepted' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/1098971544.12572.483.camel@lamb.dsg.cs.tcd.ie" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-10-28</date>
<description>

<p>I remember there was a mail from Tommy [1] suggesting a mention to the
child element OpaqueData. On the other hand, the addition of "including
its children" has clarified the text, so that might be enough.</p>

<p>[1] <loc xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0006.html">http://lists.w3.org/Archives/Public/www-xkms/2004Sep/0006.html</loc>
</p>
</description>
<originator xlink:type="simple"
xlink:href="mailto:GUILLERMOALVARO@terra.es">Guillermo Alvaro</originator>
</decided>

<decided disposition='agreed' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com">
<date>2004-11-29</date>
<description>

<p>Fixed Para 94: inserted ", including its children," to
        clarify further</p>
</description>
  <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216155122.48421.qmail@web51505.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
   </decision>
</decided>

</transitions>

</issue>

<issue id="326-jk" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Using a neutral XKMS service in the examples</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20041012131427.GE1486@inrialpes.fr" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-10-12</date>
<description>

<p>In part-1 of the spec, many examples quote an XKMS service called</p>

<eg>
     http://test.xmltrustcenter.org/XKMS
</eg>

<p>I propose that we change this to something more neutral like</p>

<eg>
    http://www.example.org/XKMS
</eg>

<p>or</p>

<eg>
    http://xkms.example.org/
</eg>

<p>To avoid having fallback if ever the real owners of that domain (which
is registered), complain to us.</p>

</description>
<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='accepted' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/416BE195.1050909@cs.tcd.ie'>
    <date>2004-10-12</date>
    <description>
      <p>
Probably a good idea. I prefer your first alternative
since www.example.org exists and refers to rfc2606
whereas the 2nd one just gives a dns error.
      </p>
<p>
FWIW, xmltrustcenter.org was a place where VeriSign
put copies of specs etc. prior to the WG starting so
I guess the chances of them complaining or of the
domain changing hands are both v. small. I just
looked for the 1st time in ages and the front page
there is quite out of date so again the change is
probably a good idea.
</p>
   </description>
 </decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com'>
    <date>2004-11-29</date>
    <description>
      <p>
      The proposed corrections were made to the Editor's draft.
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216155233.55046.qmail@web51506.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
    </decision>
 </decided>

</transitions>

</issue>

<issue id="327-jk" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>Unclear minor result code table</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20041123152942.GA1542@inrialpes.fr" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-11-23</date>
<description>

<p>In part 1, par. 122 gives a table that defines the ResultMinor
codes. There are some cells in the middle column (Possible Major
Codes) that are empty. It can be interpreted that that case is when
there is no MajorCode.</p>

<p>I think that rather it's an explanation of the MinorResult by itself.</p>

<p>In all cases, it looks confusing.</p>

</description>
<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/mid/20041130012839.38658.qmail@web51501.mail.yahoo.com'>
    <date>2004-11-29</date>
    <description>
      <p>
       Added phrase "Generic Description:" to the cells which
       don't have a corresponding major result in para[122].
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20041216155323.49073.qmail@web51505.mail.yahoo.com'>
	  <date>2004-12-16</date>
     </announced>	  
    </decision>
 </decided>

</transitions>

</issue>

<issue id="328-jk" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Unclear security bindings section</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20041123160738.GC1542@inrialpes.fr" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-11-23</date>
<description>

<p>Section 4, Security Bindings, of part-2 is not clear. It requires more explanation text.
There is no description of what is meant by "variant" on the tables or why the variant
column doesn't give variants to all the options in the tables.</p>
<p>Looks like it needs more editing.</p>

</description>
<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050301173140.47696.qmail@web51504.mail.yahoo.com'>
    <date>2005-03-01</date>
    <description>

<p>N.B. JK: This issue was announced as closed early on, but required
some extra edits since then (done by the Editor, with my feedback). I
used the last message announcement and the changelog extract to say it
was closed.</p>

<p> Updated and consolidated the tables and text in this
     section, adding
      more clarifications where needed. Among the applied
      changes, we can cite the following:</p>

      <p>Removed the
      URIs related to client authentication modes (which were
      non-existent and non-normative) in p. [72] and replaced them
      with text.</p>
      <p>Deleted sentence in p. [71] related to profile
      URIs. Changed "Variants" to "Client Authentication Modes" in
      p. [74].</p>
      <p>Added the definition of payload security to part-1,
      Section 1.2.</p>
      <p>Deleted Row in table [71b] which associated the
      Request/Response correspondence with the XKMS element
      Request/MessageDigest as it was an error.</p>
      <p>Deleted Row in table [71b] which associated the 
      Request/Response correspondence with the XKMS element Request/MessageDigest 
      as it was an error.
      </p>
      <p>
       In the tables [71b] and [74a], for Replay
       Attack, DOS, and Non Repudiation Protection, added "Any" as the
       client authentication mode.
      </p>
      <p>Changed -- in table [71b] with "Not Applicable"</p>
      <p>In table below p. [71b], for the Replay Attack, XKMS element column, added
        qualifier - "in two-phase protocol"</p>
      <p>In the table  p. [72], changed Request/MessageDigest to
        Request.Signature with MAC - which is more accurate</p>
      <p>Changed table column name "XKMS element" to "Comment" in pp. [71b]
        and [74a]</p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050418180745.86516.qmail@web51506.mail.yahoo.com'>

	  <date>2005-04-18</date>
     </announced>	  
    </decision>
 </decided>

</transitions>
</issue>

<issue id="329-tl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>NotBoundAuthentication</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc041205161411623832@mail.gmail.com"> xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2004-12-06</date>
<description>

<p>How is the shared secret "holder" in an NotBoundAuthentication intended to be
identified?</p>

<p>Apart from altering the schema (adding a "Name" attribute) the only
reasonable option seems to be, to combine these two pieces of
information and include their base64 encoding in the Value attribute.</p>

<p>For example, a protocol defined out of scope to XKMS and identified
by the URI urn:example-protocol:username-password specifies that the
Value attribute carries a username/password pair separated by a ':'
would take the form of the following instance fragment</p>

<eg>
&lt;NotBoundAuthentication
    Protocol="urn:example-protocol:username-password"
    Value="YWxpY2U6c2VjcmV0"/&gt;
</eg>


</description>
<originator xlink:type="simple"
xlink:href="mailto:lindberg_tommy@hotmail.com">Tommy Lindberg</originator>
</decided>

 <decided disposition='accepted' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/41B46367.9060403@cs.tcd.ie'>
    <date>2004-12-06</date>
    <description>
<p>Not sure if the KeyName would be best there, since I'd rather
keep the key and auth-id names separate, but in any case,
there's Tommy's b64 idea or how about "secret+sfarrell@cs.tcd.ie"
(like people use to filter emails). I could also imagine using
(whatever's the official term for) a CGI parameter in the URI
itself ("http://www.cs.tcd.ie/secrets?u=sfarrell").</p>

<p>So, I'd say we're ok not to change the schema for this one -
there's enough flexibility for what is probably a corner case.
</p>

   </description>
<originator xlink:type="simple"
xlink:href="mailto:stephen.farrell@cs.tcd.ie">Stephen Farrell</originator>

          <decision>
      <announced xlink:type='simple'
	        xlink:href="http://www.w3.org/2002/02/mid/20041012124132.GB1486@inrialpes.fr">
	  <date>2004-10-12</date>
      </announced>	  

<acknowledged disposition='agreement'
	      xlink:href="http://www.w3.org/2002/02/mid/18ec59cc04120606226aada42f@mail.gmail.com">
	      <date>2004-12-06</date>

<description>

<p>&gt; Not sure if the KeyName would be best there,</p>

<p>I second that. It seems to me that the KeyInfo in the
PrototypeKeyBinding is intended to communicate information to be bound
to the key pair being registered.</p>

<p>&gt; So, I'd say we're ok not to change the schema for this one -</p>
<p>&gt;; there's enough flexibility for what is probably a corner case.</p>

<p>I am of the same opinion.</p>

<p>&gt; Tommy's b64 idea</p>

<p>I think the prose could be clearer:
- while the schema allows for NotBoundAuthentication  be used in any
X-KRSS message section 7.1.3 paragraph says that NotBoundAuthentication
is for registration only.</p>

<p>- section 7.1.5  paragraph [296] makes liberal use of the phrase
"limited use shared secret" ; I don't like the innuendo of that and
suggest that replacing this with simply "authentication data" would be
more appropriate.  Sure, using a limited use shared secret even as per
section 8.1 may well be part of the Protocol, but this is specified by
the Protocol and therefore out of scope in this spec.</p>

</description>

              <originator xlink:type='simple'
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</acknowledged>
          </decision>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050301181212.65406.qmail@web51504.mail.yahoo.com'>
    <date>2005-03-01</date>
    <description>

<p>Fixed pp. [291] and [296] - replaced "registration request" with
"X-KRSS request"; used the phrase "limited use shared secret" as an
example for "authentication data".</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050301181212.65406.qmail@web51504.mail.yahoo.com'>
	  <date>2005-03-01</date>
     </announced>	  
    </decision>

 </decided>

</transitions>

</issue>

<issue id="330-tlr-1" type="editorial" xmlns="http://www.w3.org/2003/10/issues">
<title>AbstractRequestType / RequestAbstractType ambiguity</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/mid/20050117155442.GA31452@inrialpes.fr" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-01-17</date>
<description>

<p>The spec sometimes mentions AbstractRequestType, and sometimes
  mentions RequestAbstractType (but obviously means the same type).
  These should be unified.</p>

</description>
<originator xlink:type="simple"
xlink:mailto="tlr@w3.org">Thomas Roessler</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050301173140.47696.qmail@web51504.mail.yahoo.com'>
    <date>2005-03-01</date>
    <description>
      <p>
Replaced AbstractRequestType with RequestAbstractType   in paras [111] and [128] in
the Editor's draft[1].</p>
<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050301173140.47696.qmail@web51504.mail.yahoo.com'>
	  <date>2005-03-01</date>
     </announced>	  
<acknowledged disposition='agreement'
	      xlink:href="http://www.w3.org/2002/02/mid/20050301180457.GA1031@raktajino.does-not-exist.org">
	      <date>2005-03-01</date>

<description>
<p>I have *no* objections against the way in which these were handled.</p>
</description>

              <originator xlink:type='simple'
xlink:mailto="tlr@w3.org">Thomas Roessler</originator>
</acknowledged>
    </decision>

 </decided>
</transitions>
</issue>

<issue id="330-tlr-2" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Semantics of the ValidityInterval element</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/mid/20050117155442.GA31452@inrialpes.fr" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-01-17</date>
<description>

<p>In paragraphs 188 and 189, the semantics of the ValidityInterval
  element when used inside a UnverifiedKeyBinding element could be
  clearer. Currently, the spec says that an UnverifiedKeyBinding
  "describes" a key binding, but "makes no assertion regarding the
  status of the key binding."</p>

  <p>So, what does "the time interval in which the key binding
  relationship is asserted" mean in a context where no assertion is
  made?</p>

</description>
<originator xlink:type="simple"
xlink:mailto="tlr@w3.org">Thomas Roessler</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050301173722.56866.qmail@web51505.mail.yahoo.com'>
    <date>2005-03-01</date>
    <description>
      <p>
  Modified explanation for
        ValidityInterval in par. [189] of part-1[1] as follows:</p>
<p>ValidityInterval   [Optional]</p>
<p>The time interval for which the key binding relationship is requested to be asserted.
</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050301173722.56866.qmail@web51505.mail.yahoo.com'>
	  <date>2005-03-01</date>

     </announced>	  
<acknowledged disposition='agreement'
	      xlink:href="http://www.w3.org/2002/02/mid/20050301180457.GA1031@raktajino.does-not-exist.org">
	      <date>2005-03-01</date>

<description>
<p>I have *no* objections against the way in which these were handled.</p>
</description>

              <originator xlink:type='simple'
xlink:mailto="tlr@w3.org">Thomas Roessler</originator>
</acknowledged>
    </decision>

 </decided>

</transitions>
</issue>

<issue id="330-tlr-3" type="error" xmlns="http://www.w3.org/2003/10/issues">
<title>Concerns with the key revocation protocol</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/mid/20050117155442.GA31452@inrialpes.fr" xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-01-17</date>
<description>

<p>
This protocol basically consists in sending a double hash (the
RevocationCodeIdentifier) of a (presumably) user-typable or even
user-picked pass phrase as part of the PrototypeKeyBinding element
of a RegistrationRequest, and later sending a simple hash of the
pass phrase (the RevocationCode) to authenticate a
RevocationRequest.  The spec does not contain any confidentiality
requirements for these messages, and does not suggest encrypting
them; paragraph 288 specifically talks about sending the
RevocationCode "as plaintext."</p>

<p>An attacker with access to a RevocationCodeIdentifier can launch an
offline dictionary attack to recover either the RevocationCode or
the pass phrase.  The intended recipient of these identifiers can
also, of course, launch an offline dictionary attack.  These
dictionary attacks are an issue when the underlying pass phrases
contain too little entropy.</p>

<p>Further, eavesdroppers with access to RevocationCodeIdentifier
elements are able to determine whether two revocation codes are
identical.  If multiple key bindings are associated with the same
revocation code identifier (and, hence, the same revocation code)
and an eavesdropper observes one revocation transactions, then this
eavesdropper is able to create valid revocation requests for any of
the other key bindings with identical revocation code.</p>

<p>Based on these observations, I would recommend the following changes
to the specification text:</p>

<p>
* paragraph 288: "The double MAC calculation ensures that the
  &lt;RevocationCode&gt; value may be sent as plaintext without the risk
  of disclosing a value which might have been used by the end-user
  as a password in another context."
</p>

<p>
  I would suggest to strike this text, for several reasons:
</p>

<p>
  - As far as low-entropy passwords are concerned, the double MAC
    calculation doesn't ensure anything: These passwords are made
    accessible to an offline dictionary attack and can subsequently
    be compromised.  (They aren't technically disclosed, though.)
</p>

<p>
  - The text seems to indirectly encourage re-use of shared secrets
    across different contexts.  It shouldn't.
</p>

<p>
  - The text seems to suggest the use of low-entropy passwords to
    generate the revocation code.  It shouldn't.
</p>

<p>Paragraph 363 suggests that "the shared secret SHOULD contain a
  minimum of 32 bits of entropy if the service implements measures
  to prevent guessing of the shared secret, and a minimum of 128
  bits of entropy otherwise."
</p>
<p>
  It should, at the very least, be made crystal clear that "measures
  to prevent guessing of the shared secret" should include strong
  confidentiality protections for revocation code identifiers and
  revocation codes, to provide safeguards against the dictionary
  attacks outlined above, and to protect against attackers
  recognizing deliberate or accidental collisions of revocation
  codes.
</p>
<p>
* The security considerations part of the document should make clear
  that implementations should not re-use revocation codes across
  different key bindings (regardless of the amount of entropy used
  when generating them).

  Note that strong confidentiality protection of
  RevocationCodeIdentifier and RevocationCode elements would also
  help against this problem.
</p>
</description>
<originator xlink:type="simple"
xlink:mailto="tlr@w3.org">Thomas Roessler</originator>
</decided>

 <decided disposition='accepted' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/41B46367.9060403@cs.tcd.ie'>
    <date>2004-12-06</date>
    <description>

<p>
Other than the resolutions suggested, (which look fine at first
glance), ought we put in place a better (though non-interoperable!)
fix for the "able to determine whether two revocation codes are
identical" threat which looks, now that he says it, a bit sloppy?
</p>

<p>Fixes could be:</p>

<p>
- use a salt, chosen at registration time and available
  for querying (needs a new operation, so yuk) at revocation
  time
</p>
<p>
- use some keybits, which is fine so long as you haven't
  lost the key (key loss being quite likely in a revocation
  scenario)
</p>
<p>
- lodge foo=H(H(pwd),X) where X is a random integer between 0
  and 15, and at revocation time send all 16 possibles, resulting
  in an 1-in-4 chance of a foo-collision given the same pwd?
  (terrible hack and I've probably gotten the math wrong as usual,
  plus, the 1st revocation exposes the collision in any case, but
  at least the collision isn't apparent from the responder DB)
</p>
<p>
All sound like a bit too much work at this stage, so would anyone
like to do any of these, or is there a better idea?
</p>
   </description>
<originator xlink:type="simple"
xlink:href="mailto:stephen.farrell@cs.tcd.ie">Stephen Farrell</originator>

          <decision>
      <announced xlink:type='simple'
	        xlink:href="http://www.w3.org/2002/02/mid/41EBE417.10404@cs.tcd.ie">
	  <date>2004-01-17</date>
      </announced>	  

          </decision>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050301173937.46998.qmail@web51508.mail.yahoo.com'>
    <date>2005-03-01</date>
    <description>
<p>
Deleted the first sentences in para [288] as suggested.</p>
<p>Added clarification statement in para [363] about guessing of shared secrets.:
</p>
<p>
[363]...Implementations should not re-use revocation codes across different key bindings (regardless of the amount of entropy used when generating them). Note that strong confidentiality protection of RevocationCodeIdentifier and RevocationCode elements would also help against this problem....
</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050301173937.46998.qmail@web51508.mail.yahoo.com'>
	  <date>2005-03-01</date>

     </announced>	  
<acknowledged disposition='agreement'
	      xlink:href="http://www.w3.org/2002/02/mid/20050301180457.GA1031@raktajino.does-not-exist.org">
	      <date>2005-03-01</date>

<description>
<p>I have *no* objections against the way in which these were handled.</p>
</description>

              <originator xlink:type='simple'
xlink:mailto="tlr@w3.org">Thomas Roessler</originator>
</acknowledged>

    </decision>

 </decided>

</transitions>
</issue>

<issue id="331-fdl" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Question about Status field in requests
</title>


<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/41E6B670.1020303@crf.canon.fr"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-01-13</date>
<description>

<p>I have a technical question. It concerns Revoke, Reissue, and
Recover requests. These types of requests contain a reference to their
own types of KeyBindings (RevokeKeyBinding, ...) extensions from
KeyBindingType base type. And this type contain a Status element. In
your examples, for these types of requests, Status is always set to
"Intermediate".</p>

<p>I do not understand the utility of this field in requests. Would it be
possible to imagine other values than "Intermediate" in requests, and if
so, in which cases ?</p>
</description>
<originator xlink:type="simple"
xlink:mailto="frederic.deleon@crf.canon.fr">Frederic DELEON</originator>
</decided>

 <decided disposition='accepted' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/41B46367.9060403@cs.tcd.ie'>
    <date>2004-01-24</date>
    <description>
<p>Frederic's question would no doubt be best answered by someone
with a better perspective of the XKMS schema's evolution
than myself, however, I am willing to offer my personal
view:</p>

<p>I didn't find any occurences of the "Intermediate" so I assume
that Frederic meant "Indeterminate".  As a result, I don't think
this is an editorial issue.</p>

<p>It looks like the primary intended use of the KeyBindingType is
in the KeyBinding element in a ValidateResult. It is not clear
how a server can make use of the Status element in Revoke, Reissue
anad Recover operations and in any case, I think the server should
probably not rely on the client's opinion of the Status of a
key binding.</p>

<p>The fact that the {Revoke, Reissue, Recover}KeyBinding elements are all
of type KeyBindingType has the unfortunate(?) effect that the Status element
is required in all of these elements.  Instead they should be of types
derived directly from UnverifiedKeyBindingType (or KeyBindingAbstractType);
this would allow for information set elements better suited for each of the
intended purposes.</p>

<p>Also, the addition of a RevocationReason info set element in a RevokeRequest
would be welcome - at least X509 and PGP supports this notion.</p>

<p>All of this obviously implies schema changes and it is getting late for that.</p>
</description>
              <originator xlink:type='simple'
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050301174221.60831.qmail@web51503.mail.yahoo.com'>
    <date>2005-03-01</date>
    <description>
      <p>
 The following paragraph was added to the Editor's draft[1]:</p>
<p>[206a]Note that the X-KRSS {Revoke, Reissue, Recover} KeyBinding elements are all of type KeyBindingType, which requires a Status element (c.f. Section 7). In the case of Reissue, Revoke, and Recover requests, servers MAY ignore the Indeterminate &lt;Status&gt; status value and Clients MAY set Indeterminate as status value.</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
      </p>
     </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050301174221.60831.qmail@web51503.mail.yahoo.com'>
	  <date>2005-03-01</date>
     </announced>	  
    </decision>
 </decided>

</transitions>
</issue>

<issue id="332-tl1" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Element PrivateKey and Type attribute in the EncryptedData element
</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc0503021608129f9ae0@mail.gmail.com"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>

<p>Section '7.1.7 Element PrivateKey' does not specify whether or not
to include a Type attribute in the EncryptedData [1]. I have seen this
specified in other specs that make use of EncryptedData, most recently
in SAML 2.0.  The difference is that in XKMS, it is not intended that
the EncryptedData be used with a decrypt-and-replace operation.
Instead, it seems, the content of the EncryptedData (the RSAKeyPair
markup) is to be treated as a separate document.</p>

<p>
The fact that everybody reported interoperability despite the fact
that my own server implementation and that of SQLData use different
values for the Type attribute has led me to believe that the
usefulness of the Type attribute in this application is limited.</p>

<p>However, since it is possible/likely that the RSAKeyPair is
pre-appended with an XML declaration (^lt;?xml ... ?&gt;) I am thinking it
would be appropriate to require a Type attribute value of
http://www.w3.org/2001/04/xmlenc#Content *if* the Type attribute is
present. The MimeType attribute, while advisory, should be "text/xml"
if present.</p>

[1] <loc xlink:href="http://www.w3.org/TR/xmlenc-core">http://www.w3.org/TR/xmlenc-core</loc>

</description>

<originator xlink:type="simple"
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050331173724.20215.qmail@web51505.mail.yahoo.com'>
    <date>2005-03-31</date>
    <description>

<p>The following text was added to the description of the xenc:EncryptedData element:</p>
<p>The Type attribute SHOULD be present and, if present, MUST contain a value of http://www.w3.org/2001/04/xmlenc#Content. The MimeType attribute, SHOULD be "text/xml".</p>

  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331173724.20215.qmail@web51505.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
 </decided>

</transitions>
</issue>

<issue id="332-tl2" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>disg:PGPData Element and "trust computations"
</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc0503021608129f9ae0@mail.gmail.com"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>

<p>Due to the contradictory wording of Section '4.4.5 The PGPData
Element' of XMLSIG[2] it is not clear whether or not PGP packet types
other than Key Material Packet's are allowed in a PGPKeyPacket. In
order to support XKMS clients that want to perform "trust
computations" themselves (as opposed to delegating this to an XKMS
service), access to SignaturePackets and TrustPackets would be
useful. This is an XMLSIG issue, but I thought it would be prudent to
mention it here anyway.</p>

<p>[2] <loc xlink:href="http://www.w3.org/TR/xmldsig-core">http://www.w3.org/TR/xmldsig-core</loc></p>
</description>

<originator xlink:type="simple"
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='declined' xlink:type='simple' xlink:href='http://www.w3.org/2001/XKMS/Minutes/050308-tele.html'>
    <date>2005-03-08</date>
    <description>
<p>This issue was declined as the working group feels that this is
 a XML DSig [1] issue.  It has also been mentioned that this issue
 could be adressed as an XML DSig Errata.
</p>

<p>
[1] <loc xlink:href=" http://www.w3.org/TR/xmldsig-core">http://www.w3.org/TR/xmldsig-core</loc>
</p>
  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331182017.58881.qmail@web51501.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  

<acknowledged disposition='agreement'
	      xlink:href="http://www.w3.org/2001/XKMS/Minutes/050308-tele.html">
	      <date>2005-03-08</date>
	      <description>

<p>N.B. This topic was discussed with Tommy, who is part of the XKMS
WG, on the 8 March 2005 XKMS Teleconference (<loc
xlink:href="http://www.w3.org/2001/XKMS/Minutes/050308-tele.html">minutes</loc>). No
acknowledge from Tommy was sent to the declined announce as Tommy
agreed with it directly in the meeting.</p> 

</description>

</acknowledged>

    </decision>
</decided>

</transitions>
</issue>

<issue id="332-tl3" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Additional ResultMinor status for required ProofOfPossesion element
</title>


<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc0503021608129f9ae0@mail.gmail.com"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>

<p>As the ProofOfPossession element is optional, an additional
ResultMinor #ProofOfPossessionRequired would enhance clarity in
situations where a client does not include this element for a server
that requires it.</p>

</description>

<originator xlink:type="simple"
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050331173843.6247.qmail@web51503.mail.yahoo.com'>
    <date>2005-03-31</date>
    <description>

      <p>
The proposed
changes were accepted and added to the Editor's draft[1].</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>

  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331173843.6247.qmail@web51503.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
</decided>

</transitions>
</issue>

<issue id="332-tl4" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Processing of TimeInstant and ValidityInterval
</title>


<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc0503021608129f9ae0@mail.gmail.com"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>

<p>If a server does not support the TimeInstant element, it should
indicate a failure *unless* it includes the optional
ValidityInterval. The spec does not currently require this. Here too
an additional result code may be useful.</p>

</description>

<originator xlink:type="simple"
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050331174012.41281.qmail@web51501.mail.yahoo.com'>
    <date>2005-03-31</date>
    <description>
<p>
A new minor result code, TimeInstantNotSupported,  was added to the Editor's draft[1], A server returns this code when it doesn't support optional the TimeInstant element, rather than just silently discard it (updated pars. [213] and [122]. Updated the description of the TimeInstant element and corresponding result codes to schema.)
</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>

  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331174012.41281.qmail@web51501.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
</decided>

</transitions>
</issue>

<issue id="332-tl5" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>KeyBindingAuthentication and NotBoundAuthentication
</title>


<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc0503021608129f9ae0@mail.gmail.com"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>
<p>

The AuthenticationType is currently a xsd:sequence consisting of two
optional elements, KeyBindingAuthentication and
NotBoundAuthentication.  I can't think of a reasonable usage scenario
where both of these would be present (or both absent). An xsd:choice
may be a better ... choice.  Alternatively, some constraining text
would do the job.

</p>
</description>

<originator xlink:type="simple"
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050331174204.42041.qmail@web51509.mail.yahoo.com'>
    <date>2005-03-31</date>
    <description>
<p>
The WG didn't want to modify the XKMS schema at this point of time. Added sentence "XKMS Responders do not have to support both of these optional elements in a request message." to para 291 of part-1[1].
</p>
<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>

  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331174204.42041.qmail@web51509.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
</decided>

</transitions>
</issue>

<issue id="332-tl6" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Use of RespondWith
</title>


<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/18ec59cc0503021608129f9ae0@mail.gmail.com"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>
<p>RespondWith is only advisory so this is not a big deal but ...</p>

<p>RespondWith's should be discouraged/disallowed in request types for which the
corresponding result type does not contain any key binding types. i.e.
CompoundRequest, PendingRequest and StatusRequest.  The CompoundRequest could be an
exception, in which case it should be stated that RespondWith's in the containing
request are applied to all inner requests.</p>

</description>

<originator xlink:type="simple"
xlink:href='mailto:lindberg_tommy@hotmail.com'>Tommy Lindberg</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href=''>
    <date>2005-03-31</date>
    <description>
<p>
Updated para [112a], [128a] and [132] of part-1[1] by adding that the
&lt;RespondWith&gt; element cannot be present in these request elements.
</p>
<p>@@@ JK: verify with Tommy.</p>
<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>

  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href=''>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
</decided>
</transitions>
</issue>

<issue id="333-jk" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Ambiguity in the interpretation of [Optional] in XKMS
</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20050303060610.GA6487@inrialpes.fr"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>
<p>After some thought and analysis, my feeling is that XKMS has
an ambiguous use of the term [Optional] when referring to
elements and attributes.</p>

<p>The interpretations that this term can have here are:</p>

<p>- An element or attribute that a client or a server may
  choose to include in a message.</p>
<p>- Implementation of a given element or attribute is
  required/recommended/optional</p>

<p>The point I want to make here is that we may have an optional
element, but whose implementation is required by a server.  If the
implementation is optional, the server may then decide to ignore
it. However, it should not ignore it if the implementation is required.</p>

<p>In few cases, the spec actually says that the implementation is optional.
Most of the time it just says optional and it lets the reader the guesswork
as to whether the inclusion of the element/attribute or its support by a
client/server is optional.</p>

<p>In my opinion, this is is a source of confusion and of potential
interoperability problems. The spec should be more precise here, while
still leaving freedom of choice to the user.</p>

<p>You'll find here below a list (n.b. left in the original message
[1]) of all the elements and attributes that are optional.  I think it
would really be good to have some extra text that says if their
implementation is optional, recommended or required. We could add this
as an appendix too.</p>

[1] <loc xlink:href="http://www.w3.org/2002/02/mid/20050303060610.GA6487@inrialpes.fr">http://www.w3.org/2002/02/mid/20050303060610.GA6487@inrialpes.fr</loc>

</description>

<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050331174427.6052.qmail@web51508.mail.yahoo.com'>
    <date>2005-03-31</date>
    <description>
<p>
Defined a new ResultMinor code, OptionalElementNotSupported. A server returns this
code when it doesn't support a given feature. See par. [352a] of part-1[1].
</p>
<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>
  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331174427.6052.qmail@web51508.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
</decided>

</transitions>
</issue>

<issue id="334-jk" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>HMAC key authentication and shared secret key hints
</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://lists.w3.org/Archives/Public/www-xkms/2005Mar/0022.html"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-03-03</date>
<description>
<p>(summarizing this issue reported by Tommy for archival purposes)</p>

<p>The X-KRSS message defines the KeyBindingAuthentication element that lets
a server authenticate the key binding element within an X-KRSS request.
The content of this element has a ds:Signature calculated with an HMAC
using a preshared secret.</p>

<p>The XKMS CR specification doesn't define how to identify the
preshared secret. One developer did it using ds:KeyInfo.Keyname, while
another one used UseKeyWith with a request can notify the server which
shared secret it used. One implementation used ds:Keyinfo.Keyname where
another one used UseKeyWith with certain values to make it work.</p>

<p>In order to avoid interoperability problems, it would be good if the
XKMS recommended how to do this. Tommy's proposal to use  ds:KeyInfo.Keyname
for this  makes sense to me.</p>
</description>

<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/20050331174531.92530.qmail@web51506.mail.yahoo.com'>
    <date>2005-03-31</date>
    <description>
<p>
Added the following paragraph to the Editor's draft[1]:</p>
<p>
[277a]Clients and Responders MAY use dsig:KeyName for HMAC validation. Alternatively, they may use other Identity related information derived from security binding, such as the Sender's IP address.</p>
<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>
  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050331174531.92530.qmail@web51506.mail.yahoo.com'>
	  <date>2005-03-31</date>
     </announced>	  
    </decision>
</decided>

</transitions>
</issue>

<issue id="335-jk" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Canonicalization algorithm for shared secret data
</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20041222163421.GA15731@inrialpes.fr"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-12-22</date>
<description>
The proposed canonicalization algorithm for shared secret data found in Section 8.1 
has problems with I18N characters. Moreover, it doesn't take into acocunt binary
data that may come from authentication devices. (See the original <loc xlink:href="http://www.w3.org/2002/02/mid/20041222163421.GA15731@inrialpes.fr">comment</loc>
for a more detailed description).

</description>

<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href=' http://www.w3.org/2001/XKMS/Minutes/050111-tele.html'>
    <date>2005-03-31</date>
    <description>
<p>
  Deprecated the shared string canonicalization algorithm in favor of
  the <loc xlink:href="http://www.ietf.org/rfc/rfc4013.txt">StringPrep SASL profile</loc>.
  Indicated that binary data doesn't need to be canonicalized.</p>
  <p>The changes were made to Section 8.1, p. 329a-c of the Editor's spec[1].</p>

<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>
  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/20050119173243.20770.qmail@web51503.mail.yahoo.com'>
	  <date>2005-01-11</date>
     </announced>	  
    </decision>
</decided>
</transitions>
</issue>

<issue id="336-jk" type="change" xmlns="http://www.w3.org/2003/10/issues">
<title>Implicit polling HMAC key authentication and shared secret key hints
</title>

<transitions>
<decided disposition='raised' xlink:type="simple" xlink:href="http://www.w3.org/2002/02/mid/20050408144831.GD31009@rakahanga.inrialpes.fr"
xmlns:xlink="http://www.w3.org/1999/xlink">
<date>2005-04-08</date>
<description>
<p>The spec. is not clear for what happens in an asynchronous request 
  if a user sends a ResponseMechanism=Pending without including a PendingNotification
  element (which is optional). This seems to imply that the client needs to poll the
  server using the StatusRequest. This is not clear in the spec.
</p>
</description>

<originator xlink:type="simple"
xlink:href="http://www.w3.org/People#kahan">Jose Kahan</originator>
</decided>

 <decided disposition='agreed' xlink:type='simple' xlink:href='http://www.w3.org/2002/02/mid/18ec59cc0504131432562220a6@mail.gmail.com'>
    <date>2005-04-13</date>
    <description>
<p>
The spec says that the service MAY use the notification mechanism
indicated by the
client, it does not have to do it.  Therefore, it may be prudent of a
client implementation to not rely only on notification to indicate
when to issue the PendingRequest but to also to poll using
StatusRequest, after all the notification may never arrive.</p>

<p>Part-1 of the draft specification[1] was modified to add a more
explicit polling/notification description and the text in pp. [55] and
[56] and in Section 2.5.  A new section, 2.5.2, was added to cover the
Status Request polling procedure. The asynchronous example given in
this section was revised and an SMTP notification example was
added.</p>

<p>
[277a]Clients and Responders MAY use dsig:KeyName for HMAC validation. Alternatively, they may use other Identity related information derived from security binding, such as the Sender's IP address.</p>
<p>
[1] <loc xlink:href="http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html">http://www.w3.org/2001/XKMS/Drafts/XKMS-PR-DRAFT/PR-DRAFT-xkms-part-1.html</loc>
</p>
  </description>
    <decision>
      <announced xlink:type='simple'
	  xlink:href='http://www.w3.org/2002/02/mid/18ec59cc0504131432562220a6@mail.gmail.com'>
	  <date>2005-04-14</date>
     </announced>	  
    </decision>
</decided>

</transitions>
</issue>

</body>
</issues>
