hash
stringlengths 32
32
| doc_id
stringlengths 7
13
| section
stringlengths 3
121
| content
stringlengths 0
3.82M
|
---|---|---|---|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.22.5 CertificateTrustTreesType type
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.22.5.1 Semantics
|
Instances of this type shall contain an instance of TrustAnchorsListType as specified in clause 4.22.2. Instances of this type may also contain the following components: 1) A component for specifying constraints on the certification path. Its value shall be an integer value greater than or equal to zero. If greater than zero, it shall indicate the maximum number of CA certificates that may be in a certification path following the trustpoint. A value of zero indicates that only the given trustpoint certificate and an end-entity certificate may be used. Absence of this component indicates that there is no limit to the allowed length of the certification path. 2) The initial set of acceptable certificate policies: a sequence of identifiers of certificate policies, each of which are acceptable under the signature policy. 3) One instance of PolicyConstraintsType type as specified in clause 4.22.4. 4) One instance of NameConstraintsType type as specified in clause 4.22.3. 5) One component that shall indicate the certification path that shall be used. This may be given explicitly, or implicitly, by means of an indication that the certification path provided in the signature shall be used. If this component is present, and its content contradicts requirements in any of the previous components listed in the bullets above, the requirements in the present component shall have preference. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 28
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.22.5.2 Syntax
|
The CertificateTrustTreesType type shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:complexType name="CertificateTrustTreesType"> <xs:sequence> <xs:element ref="CertificateTrustPoint" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> <xs:element name="CertificateTrustPoint" type="CertificateTrustPointType"/> <xs:complexType name="CertificateTrustPointType"> <xs:sequence> <xs:element ref="TrustAnchors"/> <xs:element name="PathLenConstraint" type="xs:integer" minOccurs="0"/> <xs:element name="AcceptablePolicySet" type="AcceptablePoliciesListType" minOccurs="0"/> <xs:element name="NameConstraints" type="NameConstraintsType" minOccurs="0"/> <xs:element name="PolicyConstraints" type="PolicyConstraintsType" minOccurs="0"/> <xs:element ref="UseCertPath" minOccurs="0"/> </xs:sequence> </xs:complexType> <xs:complexType name="AcceptablePoliciesListType"> <xs:sequence> <xs:element name="AcceptablePolicy" type="xs:anyURI" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> <xs:element name="UseCertPath"> <xs:complexType> <xs:choice> <xs:element name="AsInSignature"/> <xs:sequence> <xs:element name="X509Certificate" type="xs:base64Binary" maxOccurs="unbounded"/> </xs:sequence> </xs:choice> </xs:complexType> </xs:element> The TrustPoint child element of CertificateTrustPointType and the X509Certificate child element of UseCertPath shall contain one DER-encoded X509 certificate conformant to IETF RFC 6960 [4]. The element PolicyConstraints, of type PolicyConstraintsType, shall be as specified in clause 4.22.4.2. 4.23 Types for defining constraints on certificates' revocation status
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.1 Introduction
|
The present clause defines two types: 1) CertificateRevReqType which defines constraints on the certificate revocation checks procedures. 2) CertificateRevStatusType which defines constraints on the trust conditions required on the certificates' revocation data.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.2 CertificateRevReqType type
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.2.1 Semantics
|
Instances of this type shall contain rules that specify requirements for the using certificate revocation status information (for instance CRLs, OCSP responses) to check the validity of a certificate. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 29 The entity that validates the signature may take into account information in the certificate for deciding how best to check the revocation status but if the information in the certificate contradicts the requirements expressed in the present component, the requirements of the present document shall take precedence. The rules specified in this component may apply to different types of certificates (e.g. the signing certificate, CA certificates, OCSP responders' certificates, CRLs issuers' certificates, Time Stamping Units' certificates, etc.). Instances of this type shall have the following components: 1) One component for specifying requirements on the revocation checking procedures for end entity certificates. 2) One component for specifying requirements on the revocation checking procedures for CA certificates. Each component shall indicate whether the revocation status of the certificate shall be verified or not, and, in case yes, whether the check shall take place using OCSP, CRL, both of them, either of them, or using other means. Revocation requirements shall be specified in terms of: • clrcheck: Checks shall be made against current CRLs (or authority revocation lists); • ocspcheck: The revocation status shall be checked using the Online Certificate Status Protocol as specified in IETF RFC 6960 [4]; • bothcheck: Both OCSP and CRL checks shall be carried out; • eithercheck: Either OCSP or CRL checks shall be carried out; • nocheck: No check is mandated; • Other: Other mechanism as defined by signature policy extension.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.2.2 Syntax
|
The CertificateRevReqType type shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="CertificateRevReq" type="CertificateRevReqType"/> <xs:complexType name="CertificateRevReqType"> <xs:sequence> <xs:element name="EndRevReq" type="RevocationReqType"/> <xs:element name="CACerts" type="RevocationReqType"/> </xs:sequence> </xs:complexType> <xs:simpleType name="RevocationReqType"> <xs:restriction base="xs:string"> <xs:enumeration value="clrcheck"/> <xs:enumeration value="ocspcheck"/> <xs:enumeration value="bothcheck"/> <xs:enumeration value="eithercheck"/> <xs:enumeration value="nocheck"/> <xs:enumeration value="other"/> </xs:restriction> </xs:simpleType>
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.3 CertificateRevTrustType type
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.3.1 Semantics
|
Instances of this type shall contain rules that specify requirements for using certificate revocation status information (for instance CRLs, OCSP responses) to check the validity of a certificate. The entity that validates the signature may take into account information in the certificate for deciding how best to check the revocation status but if the information in the certificate contradicts the requirements expressed in the present component, the requirements of the present document shall take precedence. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 30 The rules specified in this component may apply to different types of certificates (e.g. the signing certificate, CA certificates, OCSP responders' certificates, CRLs issuers' certificates, Time Stamping Units' certificates, etc.). Instances of this type shall have an instance of type CertificateRevReqType as specified in clause 4.23.2. Instances of this type may also have the following components: 1) A component defining a constraint for the freshness of the revocation status data that shall be used in the validation. This component shall either: - indicate the maximum accepted difference between the issuance date of the revocation status data of a certificate and the time of validation; or - require to accept only revocation status data issued a certain time after the best-signature time as computed in ETSI TS 119 102-1 [i.1]. For the special case when an instance of this type defines rules for certificate revocation status of the signing certificate used for validating the signature, it may also have the following component: 2) A component mandating that the signing certificate has been issued by a certification authority that keeps revocation notices for revoked certificates even after they have expired, for a period exceeding a lower bound indicated in this component.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.23.3.2 Syntax
|
The CertificateRevTrustType type shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:complexType name="CertificateRevTrustType"> <xs:sequence> <xs:element ref="CertificateRevReq"/> <xs:element name="Freshness" minOccurs="0"> <xs:complexType> <xs:choice> <xs:element name="MaxDifferenceRevocationAndValidation" type="xs:duration"/> <xs:element name="TimeAfterSignature" type="xs:duration"/> </xs:choice> </xs:complexType> </xs:element> <xs:element name="SigCertIssuedByCAKeepsExpiredRevokedCertsInfo" type="xs:duration" minOccurs="0"/> </xs:sequence> </xs:complexType> The value of TimeAfterSignature element shall be the time after the best-signature time as computed in ETSI TS 119 102-1 [i.1]. The value of the SigCertIssuedByCAKeepsExpiredRevokedCertsInfo child shall be a time indication. If the SigCertIssuedByCAKeepsExpiredRevokedCertsInfo child is present then it is mandated that the signing certificate has been issued by a certification authority that keeps revocation notices for revoked certificates even after they have expired, for a period of time exceeding the value of this child element. If the SigCertIssuedByCAKeepsExpiredRevokedCertsInfo child is absent, this constraint is not mandated.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24 The SigningCertRules element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.1 Semantics
|
The SigningCertRules element shall include a component defining the trust conditions for the signing certificate. The SigningCertRules element may also contain a component specifying whether the signing certificate or all the certificates in the certification path shall be included in the signature. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 31
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.2 Syntax
|
The SigningCertRules element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="SigningCertRules" type="SigningCertRulesType"/> <xs:complexType name="SigningCertRulesType"> <xs:sequence> <xs:element ref="MandatedSigningCertInfo" minOccurs="0"/> <xs:element ref="SigningCertTrustConditions" /> </xs:sequence> </xs:complexType> The element MandatedSigningCertInfo shall be as specified in clause 4.24.3.2. The element SigningCertTrustConditions shall be as specified in clause 4.24.4.2.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.3 The MandatedSigningCertInfo element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.3.1 Semantics
|
The MandatedSigningCertInfo element shall indicate whether the signature shall include only the signing certificate, in which case its value shall be "signingCertOnly", or the full signing certificate path, in which case its value shall be "fullPath".
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.3.2 Syntax
|
The MandatedSigningCertInfo element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="MandatedSigningCertInfo"> <xs:simpleType> <xs:restriction base="xs:string"> <xs:enumeration value="signingCertOnly"/> <xs:enumeration value="fullPath"/> </xs:restriction> </xs:simpleType> </xs:element>
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.4 The SigningCertTrustConditions element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.4.1 Semantics
|
This element shall contain: 1) a subcomponent instance of CertificateTrustTreesType type as specified in clause 4.22.5; and 2) a subcomponent instance of CertificateRevReqType type as specified in clause 4.23.3.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.24.4.2 Syntax
|
The SigningCertTrustConditions element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="SigningCertTrustConditions" type="SigningCertTrustConditionsType"/> <xs:complexType name="SigningCertTrustConditionsType"> <xs:sequence> <xs:element name="SignerTrustTrees" type="CertificateTrustTreesType"/> <xs:element name="SignerRevTrust" type="CertificateRevTrustType"/> </xs:sequence> </xs:complexType> The element SignerTrustTrees, of type CertificateTrustTreesType, shall be as specified in clause 4.22.5.2. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 32 The element SignerRevTrust, of type CertificateRevTrustType, shall be as specified in clause 4.23.3.2.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.25 The TimeEvidencesRules element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.25.1 Semantics
|
This element shall include a sequence of tuples. Each tuple: 1) Shall have a component that identifies one or more specific time evidences. 2) Shall have a component indicating the Level of Assurance, as specified in ETSI TS 119 172-1 [i.2], on the time evidences identified in the first component of the tuple. 3) May also have a component identifying trust conditions for the certificate path processing used for authenticating the time-stamping authority(ies) that generate the time evidences, and constraints on its name. This component may contain: a) One indication of the maximum elapsed time period permitted between a time instant t0 and the signature time-stamp token generation. In signature creation t0 shall be the signature creation instant. In signature validation t0 shall be the claimed signing time, if present within the signature. As above this sub-component indicates a delta time with capability for indicating deltas for days, hours, minutes, and seconds. b) One instance of CertificateTrustTreesType type as specified in clause 4.22.5. c) One instance of CertificateRevTrustType type as specified in clause 4.23.3. d) One instance of NameConstraintsType type as specified in clause 4.22.3.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.25.2 Syntax
|
The TimeEvidencesRules element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="TimeEvidencesRules" type="TimeEvidencesRulesType"/> <xs:complexType name="TimeEvidencesRulesType"> <xs:sequence> <xs:element ref="RulesForSetOfEvidences" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> <xs:element name="RulesForSetOfEvidences" type="RulesForSetOfEvidencesType"/> <xs:complexType name="RulesForSetOfEvidencesType"> <xs:sequence> <xs:element name="EvidenceIdentifiers"> <xs:complexType> <xs:sequence> <xs:element name="Identifier" type="xs:anyURI" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> </xs:element> <xs:element name="LevelOfAssurance" type="xs:anyURI"/> <xs:element ref="TimeStampTrustCondition" minOccurs="0"/> </xs:sequence> </xs:complexType> <xs:element name="TimeStampTrustCondition" type="TimeStampTrustConditionType"/> <xs:complexType name="TimeStampTrustConditionType"> <xs:sequence> <xs:element name="TstCertificateTrustTrees" type="CertificateTrustTreesType" minOccurs="0"/> <xs:element name="TstRevocationTrust" type="CertificateRevTrustType" minOccurs="0"/> <xs:element name="TstNameConstraints" type="NameConstraintsType" minOccurs="0"/> <xs:element name="SignatureTimeStampDelay" type="DeltaTimeType" minOccurs="0"/> </xs:sequence> ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 33 </xs:complexType> <xs:complexType name="DeltaTimeType"> <xs:sequence> <xs:element name="DeltaSeconds" type="xs:integer"/> <xs:element name="DeltaMinutes" type="xs:integer"/> <xs:element name="DeltaHours" type="xs:integer"/> <xs:element name="DeltaDays" type="xs:integer"/> </xs:sequence> </xs:complexType> The element TstRevocationTrust, of type CertificateRevTrustType, shall be as specified in clause 4.23.3.2. The element TstNameConstraints, of type NameConstraintsType, shall be as specified in clause 4.22.3.2.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.26 The SignerAttributesConstraints element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.26.1 Semantics
|
This component defines constrains on the signer attributes signed qualifying property, if the signature incorporate such property. If this component is not present, then any signer attribute enclosed within an attribute certificate or within a signed assertion shall be considered valid under the validation policy. This component shall be a choice between: 1) an indication that signatures according to the policy shall not include signer attributes; and 2) a list of components defining constraints for signer attributes. If the first component is present, signatures conformant to the signature policy shall not incorporate any signer attributes. Each component in the aforementioned list: 1) Shall identify the level of assurance of the signer attribute, namely: claimed, certified, a signed assertion, or any of them. 2) May include, in the case the signer attribute is certified or a signed assertion, an instance of CertificateTrustTreesType type as specified in clause 4.22.5. 3) May include, in the case the signer attribute is certified or a signed assertion, an instance of CertificateRevTrustType type as specified in clause 4.23.2. 4) May include one or more components identifying one signer attribute and providing more specific constraints for it. More specifically each component: - Shall include a component identifying the mandated signer attribute ("signer attribute identifier" hereinafter). - May include a component defining constraints on the value of the signer attribute. If the "signer attribute identifier" component is not present, then this component shall not be present. If the list of components defining constraints for the signer attributes is present, then signatures compliant with the signature policy shall incorporate the signer attributes identified in the "signer attribute identifier" components, and every signer attribute in the signature shall meet the requirements specified by the components in the numbered bulleted list above. If this component does not have any "signer attribute identifier" component, then the requirements specified by the rest of the components in the numbered bulleted list above shall apply to any signer attribute incorporated to the signature. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 34
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.26.2 Syntax
|
The SignerAttributesConstraints element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="SignerAttributesConstraints" type="SignerAttributesConstraintsType"/> <xs:complexType name="SignerAttributesConstraintsType"> <xs:choice> <xs:element name="NoSignerAttributesAllowed"/> <xs:element name="ConstraintsOnOneSetOfAttributes" type="AttributesSetConstraintsType" maxOccurs="unbounded"/> </xs:choice> </xs:complexType> <xs:complexType name="AttributesSetConstraintsType"> <xs:sequence> <xs:element name="HowCertAttribute" type="HowCertAttributeType"/> <xs:element name="AttrCertTrustTrees" type="CertificateTrustTreesType" minOccurs="0"/> <xs:element name="AttributeRevocationTrust" type="CertificateRevTrustType" minOccurs="0"/> <xs:element name="AttributeConstraints" type="AttributeConstraintsType" minOccurs="0" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> <xs:simpleType name="HowCertAttributeType"> <xs:restriction base="xs:string"> <xs:enumeration value="ClaimedAttribute"/> <xs:enumeration value="CertifiedAttribute"/> <xs:enumeration value="SignedAssertion"/> <xs:enumeration value="Any"/> </xs:restriction> </xs:simpleType> <xs:complexType name="AttributeConstraintsType"> <xs:sequence > <xs:element name="AttributeIdMustBePresent" type="xs:anyURI"/> <xs:element name="AttributeValueConstraint" type="AnyType" minOccurs="0" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> If the signer attribute type is identified by an OID, the value of the AttributeIdeMustBePresent child element shall be the OID value encoded as an URN as specified by the IETF RFC 3061 [2]. The element AttrCertTrustTrees, of type CertificateTrustTreesType, shall be as specified in clause 4.22.5.2. The element AttributeRevocationTrust, of type CertificateRevTrustType, shall be as specified in clause 4.23.3.2.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.27 The QualifyingPropertiesRules element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.27.1 Semantics
|
This component shall include a sequence of tuple. Each tuple: 1) May include an identifier of a signature level, as specified in clause 4.20.2. 2) Shall include one component defining requirements for signed properties. 3) Shall include one component defining requirements for unsigned properties. The components defining requirements for signed and unsigned properties: 1) Shall provide means for individually and completely identifying the qualifying property affected by the constraints, using an URI. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 35 2) Shall provide means for indicating a choice between several properties. 3) Shall provide means for indicating the level of the presence requirement, namely: "mandatory" or "optional". Shall provide means for applying the level of presence requirement to both individual properties and choices among several properties. Absence of the present component indicates that no requirements are imposed to qualifying properties, and signatures compliant with this signature policy may have signed/unsigned qualifying properties or not, and if they have all of them shall be considered valid against the policy. EXAMPLE: ETSI TS 119 192 [i.4] defines strategies for building URIs identifying the signed and unsigned qualifying properties.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.27.2 Syntax
|
The QualifyingPropertiesRules element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="QualifyingPropertiesRules" type="QualifyingPropertiesRulesType"/> <xs:complexType name="QualifyingPropertiesRulesType"> <xs:sequence> <xs:element name="LevelRules" type="LevelQualifyingPropertiesRulesType" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> <xs:complexType name="LevelQualifyingPropertiesRulesType"> <xs:sequence> <xs:element name="LevelIdentifier" type="xs:anyURI" minOccurs="0"/> <xs:element name="SignedQualifyingProperties" type="QualifyingPropertiesListType" minOccurs="0"/> <xs:element name="UnsignedQualifyingProperties" type="QualifyingPropertiesListType" minOccurs="0"/> </xs:sequence> </xs:complexType> <xs:complexType name="QualifyingPropertiesListType"> <xs:sequence maxOccurs="unbounded"> <xs:choice> <xs:element name="Choice"> <xs:complexType> <xs:sequence> <xs:element name="PropertyId" type="xs:anyURI" maxOccurs="unbounded"/> </xs:sequence> <xs:attribute name="presenceLevel" type="PresenceLevelType" use="required"/> </xs:complexType> </xs:element> <xs:sequence> <xs:element name="PropertyId" maxOccurs="unbounded"> <xs:complexType> <xs:simpleContent> <xs:extension base="xs:anyURI"> <xs:attribute name="presenceLevel" type="PresenceLevelType" use="required"/> </xs:extension> </xs:simpleContent> </xs:complexType> </xs:element> </xs:sequence> </xs:choice> </xs:sequence> </xs:complexType> <xs:simpleType name="PresenceLevelType"> <xs:restriction base="xs:string"> <xs:enumeration value="Mandatory"/> <xs:enumeration value="Optional"/> </xs:restriction> </xs:simpleType> ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 36
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.28 The SCDLoARules element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.28.1 Semantics
|
This component shall indicate the Level of Assurance of the signature creation device where resides the private key corresponding to the public key within the certificates validated during the certificate validation process.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.28.2 Syntax
|
The SCDLoARules element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="SCDLoARules" type="xs:anyURI"/> The SCDDLoARules shall be an URI value indicating the Level of Assurance of the signature creation device.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.29 The CryptoSuitesRules element
| |
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.29.1 Semantics
|
This component shall contain a non-empty sequence of components specifying algorithm constraints. Each component: 1) Shall include an identifier of one algorithm. 2) May contain a list of usages where it shall be allowed to use the algorithm identified by the former component. Absence of this component shall imply that it shall be allowed to use the algorithm identified by the former component in all the possible usages. Below follow the list of possible usages: - Algorithms used for generating the digital signature (Signer). - Algorithms used for generating the signing certificate (SigningCert). - Algorithms used for generating certificates in certification paths. - Algorithms used for generating revocation status data. - Algorithms used for generating time-stamp tokens. - Algorithms used for generating attribute certificates. - Algorithms used for generating signed assertions. 3) Shall contain an indication of the expiration date. 4) May contain an indication of the minimum length of a key. 5) May contain an indication of the minimum length of a hash value. 6) May contain other data whose specification is out of the scope of the present document.
|
b4ae8eef2f5007c74b19b11277c1adef
|
119 172-2
|
4.29.2 Syntax
|
The CryptoSuitesRules element shall be as defined in XML Schema file "19172xmlSchema.xsd", whose location is detailed in clause B.1, and is copied below for information. <xs:element name="CryptoSuitesRules" type="CryptoSuiteRulesType"/> <xs:complexType name="CryptoSuiteRulesType"> <xs:sequence> <xs:element name="AlgConstraints" type="AlgConstraintsType" maxOccurs="unbounded"/> ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 37 </xs:sequence> </xs:complexType> <xs:complexType name="AlgConstraintsType"> <xs:sequence> <xs:element name="AlgId" type="xs:anyURI"/> <xs:element name="Usages" type="UsagesType" minOccurs="0"/> <xs:element name="ExpirationDate" type="xs:dateTime" /> <xs:element name="MinKeyLength" type="xs:integer" minOccurs="0"/> <xs:element name="MinHashLength" type="xs:integer" minOccurs="0"/> <xs:element name="Other" type="AnyType" minOccurs="0" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> <xs:simpleType name="UsagesType"> <xs:list itemType="UsageType"/> </xs:simpleType> <xs:simpleType name="UsageType"> <xs:restriction base="xs:anyURI"> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage#Signature"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating the digital signature</xs:documentation> </xs:annotation> </xs:enumeration> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage/#SigningCert"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating the signing certificate</xs:documentation> </xs:annotation> </xs:enumeration> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage#PathCert"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating certificates in certification paths</xs:documentation> </xs:annotation> </xs:enumeration> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage#RevStatData"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating revocation status data</xs:documentation> </xs:annotation> </xs:enumeration> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage#Tstk"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating time-stamp tokens</xs:documentation> </xs:annotation> </xs:enumeration> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage#AaCert"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating attribute certificates</xs:documentation> </xs:annotation> </xs:enumeration> <xs:enumeration value="http://uri.etsi.org/19172/v1.1.1/Usage#SigAss"> <xs:annotation> <xs:documentation>Constraints for algorithms used for generating signed assertions</xs:documentation> </xs:annotation> </xs:enumeration> </xs:restriction> </xs:simpleType> ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 38 Annex A (normative): URIs for identifying signature formats A.1 URIs to signature formats mapping Table A.1 lists the URIs used for identifying the digital signature formats. Table A.1: Namespaces for identifying digital signature formats URI Format identified http://uri.etsi.org/ades/format/cades CAdES http://uri.etsi.org/ades/format/pades PAdES http://uri.etsi.org/ades/format/xades XAdES http://uri.etsi.org/ades/format/asic ASiC http://uri.etsi.org/ades/format/any Any format ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 39 Annex B (normative): XML Schema file B.1 XML Schema file location for namespace http://uri.etsi.org/19172/v1.1.1# The file at https://forge.etsi.org/rep/esi/x19_17202_XML_sign-policies/raw/v1.1.1/19172xmlSchema.xsd contains the definitions of qualifying properties defined within the namespace whose URI value is http://uri.etsi.org/19172/v1.1.1#. ETSI ETSI TS 119 172-2 V1.1.1 (2019-12) 40 History Document history V1.1.1 December 2019 Publication
|
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
1 Scope
|
The present document defines the building blocks of signature policy and specifies a table of contents for human readable signature policy documents.
|
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
2 References
| |
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI EN 319 142-1: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures". [2] ISO 19005-2:2011: "Document management - Electronic document file format for long-term preservation - Part 2: Use of ISO 32000-1 (PDF/A-2)". [3] ETSI TS 103 172: "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile".
|
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. [i.2] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardisation of signatures; Definitions and abbreviations". [i.3] ETSI TR 119 100: "Electronic Signatures and Infrastructures (ESI); Business Driven Guidance for Signature Creation and Validation". [i.4] ETSI EN 319 102-1: "Electronic Signatures and Infrastructures (ESI); Procedures for Signature Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation". [i.5] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". [i.6] ISO/IEC 27001: "Information technology -- Security techniques -- Information security management systems -- Requirements". [i.7] ISO/IEC 27002: "Information technology -- Security techniques -- Code of practice for information security management". [i.8] ETSI TS 103 173: "Electronic Signatures and Infrastructures (ESI); CAdES Baseline Profile". ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 8 [i.9] ETSI TS 103 171: "Electronic Signatures and Infrastructures (ESI); XAdES Baseline Profile". [i.10] Unified Modelling Language. NOTE: Available at http://www.uml.org/#UML2.0. [i.11] ETSI TS 102 231: "Electronic Signatures and Infrastructures (ESI); Provision of harmonized Trust-service status information". [i.12] ETSI TS 119 612 (V1.1.1): "Electronic Signatures and Infrastructures (ESI); Trusted Lists". [i.13] IETF RFC 5280: "internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile". [i.14] IETF RFC 6960: "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP". [i.15] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. [i.16] Commission Decision 2009/767/EC of 16 October 2009 setting out measures facilitating the use of procedures by electronic means through the 'points of single contact' under Directive 2006/123/EC of the European Parliament and of the Council on services in the internal market. [i.17] Commission Decision 2013/662/EU of 14 October 2013 amending Decision 2009/767/EC as regards the establishment, maintenance and publication of trusted lists of certification service providers supervised/accredited by Member States. [i.18] Commission Decision 2011/130/EU of 25 February 2011 establishing minimum requirements for the cross-border processing of documents signed electronically by competent authorities under Directive 2006/123/EC of the European Parliament and of the Council on services in the internal market. [i.19] Business Process Modelling Notation: "A standard for modelling business processes and web service processes, as put forth by the Business Process Management Initiative". NOTE: Available at www.bpmi.org. [i.20] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures". [i.21] ETSI EN 319 132-1: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures". [i.22] ETSI EN 319 122-2: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 2: Extended CAdES signatures". [i.23] ETSI EN 319 132-2: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 2: Extended XAdES signatures". [i.24] IETF RFC 3647: "Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework". [i.25] ETSI EN 319 142-2: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 2: Additional PAdES signatures profiles". [i.26] ETSI EN 319 162-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC Baseline containers". [i.27] ETSI EN 319 162-2: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 2: Extended Containers". [i.28] ETSI TS 102 918: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC)". ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 9 [i.29] Commission Implementing Decision 2014/148/EU of 17 March 2014 amending Decision 2011/130/EU establishing minimum requirements for the cross-border processing of documents signed electronically by competent authorities under Directive 2006/123/EC of the European Parliament and of the Council on services in the internal market. [i.30] ETSI TS 119 172-2: "Electronic Signature Infrastructure; Signature Policies; Part 2: XML format for signature policies". [i.31] ETSI TS 119 172-3: "Electronic Signature Infrastructure; Signature Policies; Part 3: ASN.1 format for signature policies". [i.32] Commission Decision 2010/425/EU of 28 July 2010 amending Decision 2009/767/EC as regards the establishment, maintenance and publication of trusted lists of certification service providers supervised/accredited by Member States. [i.33] ETSI TS 101 733: "Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES)". [i.34] ETSI TS 101 903: "Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES)". [i.35] ETSI TS 102 778: "Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1". [i.36] Recommendation CCITT X.800 (1991): "Security Architecture for Open Systems Interconnection for CCITT applications. ISO 7498-2:1989, Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture". [i.37] Recommendation ITU-T X.1252 (2010): "Cyberspace security - Identity management - Baseline identity management terms and definitions". [i.38] Recommendation ITU-T X.509 | ISO/IEC 9594-8: "Information technology - Open systems interconnection - The Directory: Public-key and attribute certificate frameworks".
|
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
3 Definitions and abbreviations
| |
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
3.1 Definitions
|
For the purposes of the present document, the following terms and definitions apply: CA-certificate: public-key certificate for one CA issued by another CA or by the same CA NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. certification authority (CA): authority trusted by one or more users to create and assign public-key certificates. Optionally the certification authority may create the subjects' keys NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. certification path: ordered list of one or more public-key certificates, starting with a public-key certificate signed by the trust anchor, and ending with the public key certificate to be validated NOTE 1: All intermediate public-key certificates, if any, are CA-certificates in which the subject of the preceding certificate is the issuer of the following certificate. NOTE 2: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. certificate validation: process of verifying and confirming that a certificate is valid cryptographic system: collection of transformations, normally defined by a mathematical algorithm, from plain text into cipher text and vice versa, the particular transformation(s) to be used being selected by (private or public) keys NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 10 data integrity: property that data has not been altered or destroyed in an unauthorized manner NOTE: As defined in ITU-TRecommendation X.800 | ISO 7498-2 [i.36]. data origin authentication: corroboration that the source of data received is as claimed NOTE: As defined in ITU-TRecommendation X.800 | ISO 7498-2 [i.36]. digital signature: data appended to, or a cryptographic transformation (see cryptography) of a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g. by the recipient. NOTE: As defined in ITU-TRecommendation X.800 | ISO 7498-2 [i.36]. private key: in a public key cryptographic system, that key of an entity's key pair which is known only by that entity NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. public key: in a public key cryptographic system, that key of an entity's key pair which is publicly known. NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. public key certificate: public key of an entity, together with some other information, rendered unforgeable by digital signature with the private key of the certification authority which issued it NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. public key infrastructure: infrastructure able to support the management of public keys able to support authentication, encryption, integrity or non-repudiation services NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. repudiation: denial by one of the entities involved in a communication of having participated in all or part of the communication NOTE: As defined in ITU-TRecommendation X.800 | ISO 7498-2 [i.36]. signature augmentation: process of incorporating to a digital signature information aiming to maintain the validity of that signature over the long term NOTE: Augmenting signatures is a co-lateral process to the validation of signatures, namely the process by which certain material (e.g. time stamps, validation data and even archival-related material) is incorporated to the signatures for making them more resilient to change or for enlarging their longevity. signature augmentation policy: set of rules, applicable to one or more digital signatures, that defines the technical and procedural requirements for their augmentation, in order to meet a particular business need, and under which the digital signature(s) can be determined to be conformant NOTE: This covers collection of information and creation of new structures that allows performing, on the long term, validations of a signature. signature creation device: configured software or hardware used to create a digital signature signature creation policy: set of rules, applicable to one or more digital signatures, that defines the technical and procedural requirements for their creation, in order to meet a particular business need, and under which the digital signature(s) can be determined to be conformant signature policy: signature creation policy, signature augmentation policy, signature validation policy or any combination thereof, applicable to the same signature or set of signatures signature policy authority: entity responsible for the drafting, registering, maintaining, issuing and updating of a signature policy signature policy document: document expressing one or more signature policies in a human readable form signature validation: process of verifying and confirming that a digital signature is valid ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 11 signature validation policy: set of rules, applicable to one or more digital signatures, that defines the technical and procedural requirements for their validation, in order to meet a particular business need, and under which the digital signature(s) can be determined to be valid trust: firm belief in the reliability and truth of information or in the ability and disposition of an entity to act appropriately, within a specified context NOTE: As defined in Recommendation ITU-T X.1252 [i.37]. Trust Anchor (TA): entity that is trusted by a relying party and used for validating certificates in certification paths NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. Trust Anchor information: at least the: distinguished name of the Trust Anchor, associated public key, algorithm identifier, public key parameters (if applicable), and any constrains on its use including a validity period NOTE: As defined in Recommendation ITU-T X.509 | ISO/IEC 9594-8 [i.38]. validation data: data that is used to validate a digital signature
|
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
3.2 Abbreviations
|
For the purposes of the present document, the following abbreviations apply: ASiC Associated Signature Container ASN Abstract Syntax Notation B2B Business to Business B2C Business to Consumer BPMN Business Process Modelling Notation BSP Business Scoping Parameter CA Certification Authority CD Commission Decision CRL Certificate Revocation List DA Driving Application DTBS Data To Be Signed EC European Commission EN European Standard EU European Union IP Internet Protocol Gov2B Government to Business Gov2C Government to Consumer LoA Level of Assurance OCSP Online Certificate Status Protocol OID Object IDentifier PKI Public Key Infrastructure SCA Signature Creation Application SVA Signature Validation Application TA Trust Anchor ToC Table of Content TR Technical Report TS Technical Specification TSP Trust Service provider TSTA Time-Stamp Token applied in an archive level of CAdES signature or XAdES signature TSTT-Level Time-Stamp Token applied in a T-Level of CAdES signature or XAdES signature UML Unified Modelling Language URI Uniform Resource Identifier URL Uniform Resource Locator UK United Kingdom XML eXtensible Markup Language WYSIWYS What You See IS What You Sign ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 12
|
5df53c7ec6b2f44c09ebdd3915e5cb66
|
119 172-1
|
4 Signature policies and signature policy document
|
A signature policy should be derived from the analysis of the requirements applicable to the implementation of digital signatures into a specific business electronic process or application domain. That requirement analysis should be done according to the process described in ETSI TR 119 100 [i.3]. The resulting rules related to the creation, augmentation and/or validation of one or more signatures to which the same set of rules apply shall be documented in a signature policy. A signature policy shall cover at least one of the three following aspects related to the management of the signatures to which it applies: 1) a signature creation policy; 2) a signature augmentation policy; or 3) a signature validation policy. When there is a need for expressing a signature policy in a human readable form, the table of content (ToC) specified in annex A shall be followed to establish the corresponding signature policy document, or the signature policy shall be expressed under the form of a signature policy statement summary established on the basis of table A.1 from annex A. The numbering of the clauses of the table of content is provided in annex A as it shall appear in the signature policy document by removing the starting "A.". Each clause shall appear. If the clause does not apply, "not applicable" shall be written after the clause title. The text provided in each clause of annex A specifies the expected content of each clause. This text shall not be copied in the signature policy document. Where applicable, the sub-clauses of the signature policy document may identify separate provisions for each signature policy addressed by the signature policy document and for each of them may identify separate provisions for the creation, augmentation and validation by using the following labels to start dedicated clauses on creation, augmentation, or validation aspects, respectively: - [CREATION] - [AUGMENTATION] - [VALIDATION] The provisions expressed in each clause may be texted explicitly or incorporated by reference to other sources of provisions, in particular to abide by, endorse, inherit or enforce requirements from other signature policies. Clause A.3 covers the rules or requirements set by a signature policy organized against business scoping parameters (BSPs) which are: • parameters mainly related to the application and/or business process for which implementation of signature(s) is required; • parameters mainly influenced by legal provisions associated to the application and/or business context in which the business process takes place; • parameters related to the actors involved in the creation/validation of signatures; and • other signature parameters. The sub-clauses of clause A.3 shall each include the description of the applicable BSP provisions in terms of business language and shall indicate separately the corresponding requirements on signers, entities augmenting signatures and/or relying parties validating signatures covered by each signature policy addressed by the signature policy document. When a specific business or application process involves several groups of signatures addressed by different signature policies, a single signature policy document may be used to express those signature policies. EXAMPLE: Multiple signatures applied to the same data or to different (sets of) data being signed by the same or different entities at different moments alongside the workflow of events with a need for evidences covered by the considered workflow. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 13 NOTE: A signature policy document can cover a group of several signature policies, in which case each signature policy defines the set of rules applicable to one or several signatures to which the same set of rules applies. The signature policy document shall at least be provided in the form of a PDF/A-2 document according to ISO 19005-2 [2]. It shall be digitally signed according to PAdES baseline signatures ETSI TS 103 172 [3] or ETSI EN 319 142-1 [1]. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 14 Annex A (normative): Table of contents for signature policies expressed as human readable documents Notwithstanding the provisions of the copyright clause related to the text of the present document, ETSI grants that users of the present document may freely reproduce the signature policy document table of content proforma in annex A so that it can be used for its intended purposes and may further publish the completed signature policy document. A.1 Introduction A.1.1 Overview This clause shall provide a general introduction to the document being written. It shall provide a synopsis of the business or application domain and the specific business or application process to which the expressed signature policy(ies) applies(apply). Depending on the complexity and scope of the particular business or application process implementing signatures, a diagrammatic representation may be useful here. A.1.2 Business or Application Domain A.1.2.1 Scope and boundaries of signature policy This clause shall describe the scope and boundaries of the business (application) domain in which the signature policy(ies) is(are) suitable for use. NOTE: The business (application) domain is any business or commercial transaction process(es), which can involve several actors/participants and/or multiple actions and which can require one or multiple signatures to give it effect. EXAMPLE: This can range from a purely corporate internal process or set of processes, through a multi-party trading network whose parties can negotiate and agree on the applicable terms and rules, up to nationwide rules governing the use of electronic signatures in eGovernment and eBusiness processes. The signature policy(ies) may be applicable to one or several domains of applications (e.g. B2B, B2C, Gov2B, Gov2C, contractual, financial, medical/health, consumer transactions, e-notary services, etc.), whether mono-organization, corporate or cross-organizations, nationwide or cross-borders, horizontal or vertical (e.g. eProcurement, eInvoice, eHealth, eJustice, etc.). When applicable the hierarchy of signature policies included in the signature policy document shall be detailed, illustrated and be consistently identified (see clause A.1.3.2). A.1.2.2 Domain of applications When applicable and when not sufficiently described by clause A.1.1, this clause shall further describe each domain of applications that is considered and for which the usage of signatures is ruled by the signature policy document. A.1.2.3 Transactional context This clause shall provide additional information about the transactional context, when applicable. EXAMPLE: Request for Proposal, any form of offer, exchange of documents of certain specific types, draft of contractual terms and nature of those terms (e.g. contract, Non-Disclosure Agreement, etc.), approval, any type of acknowledgement (e.g. of receipt, of delivery, of sending, etc.), documents requiring specific types of authorization (e.g. because of value, because of applicable law or legal requirements, etc.), etc. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 15 A.1.3 Document and policy(ies) names, identification and conformance rules A.1.3.1 Signature policy document and signature policy(ies) names This clause shall provide information about any applicable name for the signature policy document and about any applicable name(s) for the signature policy(ies) covered by the signature policy document. A.1.3.2 Signature policy document and signature policy(ies) identifier(s) This clause shall provide information about any other applicable identifiers for the signature policy document and for the signature policy(ies) it covers. EXAMPLE 1: Unique identifier, OIDs. When applicable, the hierarchy of signature policies included in a signature policy shall be identified, in such a way that at least one distinct unique identifier shall be allocated to the signature policy document itself and to each signature policy it covers. When OIDs are used, the OID for each set of rules may be derived from the OID of the signature policy document. EXAMPLE 2: This can be done through the allocation of sub-OIDs subordinated to OID of the main signature policy. A signature policy document has identifier 1.3.777.1.1; three sets of rules applicable to three types of signatures in the concerned workflow of the business process can be identified via the respective 1.3.777.1.1.1, 1.3.777.1.1.2, and 1.3.777.1.1.3 OIDs. A.1.3.3 Conformance rules This clause shall provide information about conformance rules. A.1.3.4 Distribution points This clause shall provide information about where the signature policy document is available (e.g. a URL or by email) under electronic format (e.g. PDF) and, when applicable, how a paper/hard copy can be made available. It may also provide information about whether and where the signature policy(ies) covered by the signature policy document are available under one or more machine processable formats (e.g. [i.30] and [i.31]). A.1.4 Signature policy document administration A.1.4.1 Signature policy authority This clause shall include the name of the signature policy authority responsible for the signature policy document and the policy(ies) it covers, together with its country of establishment, its postal or electronic address and where applicable its registration number as stated in the official records of the country of establishment. It shall also provide information identifying the public key certificate corresponding to the private key used by the signature policy issuer to digitally sign the signature policy document. When the policy authority is responsible for determining whether one or more separate signature policies are allowed to be subordinated, included in or include a signature policy defined in the signature policy document, this clause shall include: • the name or title of the entity in charge of making such a determination; • its electronic mail address or alias; • its telephone number; • its fax number; and • other generalized information. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 16 In this case, this clause shall also include, either by reference or explicitly, the procedures by which that determination is made. A.1.4.2 Contact person When the contact point is a natural person, this clause shall include the: a) name; b) electronic mail address; and c) telephone number. In other cases, it shall include: a) a title or role; b) an electronic mail alias; and c) other generalized contact information. This clause may state that the contact person, alone or in combination with others, is available to answer questions about the document. A.1.4.3 Approval procedures This clause shall include the procedures by which the approval of the signature policy document is made. A.1.5 Definitions and Acronyms This clause shall contain a list or a reference to a list of definitions for defined terms used within the signature policy document, as well as a list or a reference to a list of acronyms and their meanings. A.2. Signature application practices statements This clause shall include, either by reference or explicitly, the set of policy and security practices requirements that the driving application (DA), the signature creation application (SCA) and/or the signature validation application (SVA) shall meet when creating, augmenting and/or validating signatures in accordance with the signature policy document. When the policy and security practices requirements applicable to SCA and/or SVA are included explicitly in this clause, the table of content of this clause shall conform to the structure defined in annex D of the present document. A.3 Business scoping parameters A.3.1 BSPs mainly related to the concerned application/business process A.3.1.1 BSP (a): Workflow (sequencing and timing) of signatures This clause shall describe and specify whether the business electronic process and hence the signature policy address a single signature or a set of signatures. When the signature policy addresses a set of signatures, this clause shall describe and specify the workflow. The workflow should be produced using the Unified Modelling Language (UML) [i.10], the Business Process Modelling Notation (BPMN) [i.19] or any similar standard notation in order to provide continuity into the development and use of signatures. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 17 The workflow shall indicate: a) The sequence flow of data exchanges between those actors in the considered business scenario or application process and the use cases involving generation, augmentation and/or validation of signature(s) in this application process in the considered business scenario. b) The sequencing and the cardinality of the concerned signatures and whether the concerned workflow is made of: - parallel (or independent) signatures (i.e. signatures applied exactly to the same data); - serial signatures (i.e. signatures applied to different data and serialized); - counter signatures (i.e. signatures successively applied to the set of previous signatures, and optionally to the same original data); or - a combination of such signatures. c) Whether the signatures apply on individual transaction, or apply on a block of transactions. d) What the actors are (e.g. customer, bank agent, merchant, application server, mass-signing server, legal person) and their business signing role (primary signature versus countersignature) defining the relationship between each actor's signature and any other required signature. e) For each data to be signed, what sequence of signature(s) applies (e.g. single; multiple parallel; counter signatures; sequential; or a combination). f) Whether and which signature is required to be validated before generating the next signature in the workflow. This clause shall indicate whether the time when a signature is generated is relevant or not. It shall indicate the timing constraints applying to the generation of signatures. NOTE 1: The time at which the signature was generated can be relevant when legally enforceable. EXAMPLE: Signature to be generated before a certain deadline, set of parallel signatures to be generated within a certain timeframe, elapsed time between two serial or counter signatures to be greater, equal or smaller than a certain duration, etc. This clause shall indicate whether the time when a signature is validated is relevant or not. It shall indicate the timing constraints applying to the validation of signatures. NOTE 2: In some business scenarios, sequence and timing relate to signatures on multiple documents or signatures which all form part of a single process or transaction. In some circumstances, the validity or acceptance of an agreement/authorization, etc. is contingent upon certain steps or approvals having been taken within given timeframes, e.g.: Where the signature of superior company officer is required to authorize or "sign off" a piece of work, this signature comes after the primary signature of the employee who has performed the work. The counter signature is not allowed to occur after a certain delay or not before a certain delay. This clause shall indicate whether mass signing is applicable (e.g. a significant number of signatures signing a significant number of documents per day), as this can have an impact on, for example, requirements for use of signing devices designed for mass signing (e.g. hardware security modules). A.3.1.2 BSP (b): Data to be signed For each signature identified and for each data to be signed (DTBS) as identified in the concerned workflow (see BSP(a)), this clause shall describe and specify all the relevant aspects concerning the data that have to be signed and the related technology, i.e. the type of technological environment in which those data are managed. These aspects shall include: 1) the format of the data to be signed; and ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 18 2) where that data to be signed is structured, indication whether the whole data or only certain part(s) will be signed. EXAMPLE: Binary, structured data, xml, PDF document, editable documents such as word processor made, multimedia packages, images, etc. NOTE 1: The type of format for the DTBS can be influenced by business risks or legal provisions, for example, when a specific provision is imposed on the formalities of signing (e.g. what you see is what you sign, see BSP(i)). NOTE 2: Signatures can be generated following XML, ASN.1 or PDF syntax. Where the data to be signed is specified in one of the aforementioned syntaxes, the initial choice is to select the signature defined for that syntax, unless other business parameters clearly recommend using another one. A.3.1.3 BSP (c): The relationship between signed data and signature(s) For each signature identified and for each data to be signed as identified in the concerned workflow (see BSP(a)), this clause shall describe and specify the type of relationship between the signed data and the signatures. These aspects shall include: 1) The need for signed data referencing mechanisms. EXAMPLE: The use or relevance of bulk signatures, i.e. when one signature will sign different data (e.g. through the implementation of signature on several document references consisting in hashes of the referenced documents). 2) The number of data that one signature actually signs. 3) The relative position of the signature and its signed data (e.g. associated within an ASiC container, enveloped signature, enveloping signature, detached signature). 4) The signature format and levels to be used. NOTE: Levels of signatures as defined in ETSI standards on signature formats (e.g. [3], [i.8], [i.9], [i.20] to [i.23], [i.25] to [i.28], [i.33] to [i.35]) address incremental (augmenting) requirements to maintain the validity of the signatures over the long term, in a way that a certain level always addresses all the requirements addressed at levels that are below it. A.3.1.4 BSP (d): Targeted community For each signature identified and for each data to be signed as identified in the concerned workflow (see BSP(a)), this clause shall identify and describe: 1) the addressed community; and 2) any specific community rules in place. EXAMPLE: These rules can state the conditions under which a certain signature is relied upon, or include provisions relating to the intended effectiveness of signatures, where multiple signatures are required. NOTE: These rules can impact not only the formats of the signatures and their relationships with the signed documents, but also the specific standards and/or levels to be used. A.3.1.5 BSP (e): Allocation of responsibility for signature validation and augmentation For each signature identified and for each data to be signed as identified in the concerned workflow (see BSP(a)), this clause shall describe and specify the allocation of the responsibility of validating and/or augmenting such signatures in particular among the following entities, according to the specificities of the business process: 1) Party relying on the signature, being either the signer or any other appropriate relying party; 2) Signature validation trust services, on request of either the signer or any other appropriate relying party; or ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 19 3) Business processes where countersignatures are generated, as they could require that counter-signing parties to perform a validation of the signature(s) to be counter-signed before actually countersigning them, as part of the data flow. NOTE: These three types of allocations are not necessarily exclusive, being it possible that some of them coexist within complex business processes. This clause should also identify requirements for augmenting signatures as they are validated and progressed in the business process data flow. A.3.2 BSPs mainly influenced by the legal/regulatory provisions associated to the concerned application/business process A.3.2.1 BSP (f): Legal type of the signatures For each signature identified in the concerned workflow (see BSP(a)) this clause shall describe and specify the signature legal type required in the context of the business process and the associated legal requirements. NOTE 1: This parameter has an impact on the level of assurance on the authentication (i.e. the certification of the identification) of the actor generating a signature, on the class and policy requirements on the TSP providing such level of assurance, on the class of signature creation device used by such actors, and on the use of a specific trust model for TSP issuing certificates (e.g. trusted lists, specific trust anchors in PKI hierarchy, use of certification authority certificate stores). NOTE 2: In Europe, the following levels are identified a) In accordance with Directive 1999/93/EC [i.15], CD 2009/767/EC [i.16] as amended by CD 2010/425/EU [i.32] and by CD 2013/662/EU [i.17] and CD 2011/130/EU [i.18] as amended by CD 2014/148/EU [i.29]: qualified electronic signatures, advanced electronic signatures supported by a qualified certificate, and advanced electronic signatures. b) In accordance with Regulation (EU) No 910/2014 [i.1]: qualified electronic signatures, advanced electronic signatures supported by a qualified certificate, advanced electronic signatures, qualified electronic seals, advanced electronic seals supported by a qualified certificate, advanced electronic seals. A.3.2.2 BSP (g): Commitment assumed by the signer For each signature identified in the concerned workflow (see BSP(a)) this clause shall specify the authorized types of commitment associated to the signature. NOTE 1: A commitment type associated to a signature is the representation of the expected purpose and meaning of the signature and of the precise nature of the responsibility assumed by the signer when generating the concerned signature. NOTE 2: The explicit description of such signature commitments avoids potential ambiguity when signatures do not provide equivalent contextual information as in the paper world leading to uncertainty about the signer's intention; relying on the implicit contextual information is hazardous. NOTE 3: Indication of commitment types assists in the management and validation of multiple signatures under a signature policy. A commitment type shall be expressed as a unique identifier (OID or URI), associated to a description of the commitment type in a language that is understandable by the signer and at least in UK English. EXAMPLE: The commitment types can be a representation of the fact that: the signature is intended for data authentication purposes only; the signature is intended for entity authentication purposes only; or the signature is created with the intention to sign the associated data (signed data): - as a draft; ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 20 - as an acknowledgement of receipt; - as an intermediate approval as part of a decision process; - to indicate authorship or responsibility for a document (signed data); - to indicate having reviewed a document (signed data); - to certify that a document is an authentic copy; - to indicate witnessing of someone else's signature on the same document (signed data) having read, approving and being bound accordingly to the content of the data that is signed; - etc. etc. and being bound accordingly to the data that is signed. The commitment types defined in annex B may be used. A.3.2.3 BSP (h): Level of assurance on timing evidences For each signature identified in the concerned workflow (see BSP(a)): 1) This clause shall describe and specify the requirements on the level of assurance on the required timing evidences. 2) This clause should address: a) whether and on which type of data a timing evidence is required to be generated (e.g. a mere signing time indication claimed by the signer, or time evidences on signed data, on signature(s), on signature(s) and validation data, etc.); and b) for each required timing evidence: i) whether claimed assertions with regards to time information are allowed; or ii) whether time stamps provided by trust service providers are required, and in this case what the requirements and level of assurance associated respectively to the time stamps and the providers are. NOTE: This clause is closely related to the clauses BSP(a), (j) and (k). A.3.2.4 BSP (i): Formalities of signing For each signature identified in the concerned workflow (see BSP(a)): 1) This clause shall describe and specify the way evidences are built with regards to the expression of will or intention of the signer to sign and in particular the requirements related to the way the attention of the signer is drawn to the significance of the commitment he is undertaking by performing the act of signing. NOTE 1: This aims at requiring that signing systems are built in a way that satisfy, as much as possible, legal requirements on expression of will or intentions by the signers. 2) This clause shall identify and specify: a) requirement for having a WYSIWYS environment; b) requirements for providing the actor generating/ validating signatures with: i) proper advice and information on the application's signature process; ii) proper advice and information on legal consequences; and iii) a user interface satisfying legal requirements on expression of will or intentions by the signers. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 21 c) requirements on the user interface: iv) guaranteeing the above requirements; v) allowing and demonstrating clear expression of a will to sign and the user's intention to be bound by the signature; vi) allowing and demonstrating an informed consent; and vii) ensuring consistence between the use of the appropriate signature creation and validation data, signature creation device, the data to be signed and the expected scope and purpose of the signature (or the act of signing); and d) requirements for providing the relying parties (including the signer) with correct procedures for the validation and the archival of the signature and the validation data. NOTE 2: Addressing formalities of signing can impact the selection of appropriate protection profiles and conformity assessment schemes against which the signature creation application and/or signature validation application will be designed and assessed. A.3.2.5 BSP (j): Longevity and resilience to change For each signature identified in the concerned workflow (see BSP(a)), this clause shall describe and specify the expected longevity and resilience to change of the signature such that it is verifiable up to a given period of time. EXAMPLE: Such period of time can be defined as short term (transaction lifetime up to 1 day), medium term (up to the remaining time before expiration of the signing certificate), long term (up to min_of{6years; max_of{guarantee-given-by-TSTT-Level;weakest-robustness-of-signatures-on- Validation-Data}}), or very long term (guarantee-given-by-the-TSTA-or-the-successive- application-of-TSTA's). NOTE: Such requirements can have an impact on the adequate level of the signature (see [3], [i.8], [i.9], [i.20] to [i.23], [i.25] to [i.28], [i.33] to [i.35]), on the adequate key length (usually determined by the TSP having issued the signing certificate) of the signature private key, and on the selection of the cryptographic suites. To this extent BSP(p) recommendations can be followed according to the expected resistance of the signature. A.3.2.6 BSP (k): Archival For each signature identified in the concerned workflow (see BSP(a)), this clause shall describe and specify archival requirements. A.3.3 BSPs mainly related to the actors involved in creating/augmenting/validating signatures A.3.3.1 BSP (l): Identity (and roles/attributes) of the signers For each signature identified in the concerned workflow (see BSP(a)): 1) This clause shall describe and specify requirements on: a) the nature/type and identification of the proposed signers; b) the associated signer identification rules; c) if any, the rules applicable to the roles and/or attributes of the signers; and d) if any, the associated proof of authority and the type of proof of authority to sign that is acceptable and whether authority to sign can be delegated. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 22 2) This clause shall, in consequence, identify and describe: a) what the necessary components are to ensure that a signature is that of a specified individual (e.g. whether a natural or legal person, a business or transactional functional entity, a machine, an application or server, etc.); and b) what the required identification components (identity attributes) are for each type of signer. EXAMPLE: Where a contract names an individual as a party to be bound by its terms, what is required as signer identification elements; names, date of birth, unique identification number, etc. NOTE 1: In some business scenarios, the role or attributes of a signer are at least as important as his identity. "Signer role" does not refer here to the "signing" role played by the signer in the signature supported business process (e.g. primary signature, countersignature) but relates to roles such as "official representative of a legal person" or "sales director", which can be claimed or certified, and which imply some attribute(s) being associated with the signer. This clause aims to describe the set of attributes, authorities and responsibilities which are associated with each signer, his access rights, or authority to sign, to act on behalf of the organization he purports to represent, etc. NOTE 2: Where parties have already established communications, and there is ostensible authority to enter into the proposed transaction, an identity certificate can be considered sufficient. In some cases, additional proof can be appropriate, an attribute certificate issued by a trust service provider, signed assertions or attested attribute information issued by a reliable source. This can include proof that an employee or representative is authorized to enter into transactions over a specified value. A.3.3.2 BSP (m): Level of assurance required for the authentication of the signer For each signature identified in the concerned workflow (see BSP(a)), this clause shall describe and specify the level of assurance required for the authentication of the signer, in particular what the expectations are in terms of trust on the signer's identification (e.g. assurance or quality level of the certification policy under which a certificate has been issued and of the device used to protect the private key). EXAMPLE: Certificates can be required to be legally recognized certificates and/or issued by an accredited, supervised, certified, or audited certification authority, or be issued according to a specific certificate policy, etc. A.3.3.3 BSP (n): Signature creation devices For each signature identified in the concerned workflow (see BSP(a)), this clause shall describe and specify requirements on the signature creation devices that will be used for generating the signatures within the business process. A.3.4 Other BSPs A.3.4.1 BSP (o): Other information to be associated with the signature For each signature identified in the concerned workflow (see BSP(a)), this clause shall describe and specify, when applicable, any requirement to associate other information with the signature and any requirement on such information. EXAMPLE: Such information can be signature policy reference, geographic location at which the signature takes place, content related information, etc. NOTE: This can have an impact on the use of additional signature attributes that will be added to the DTBS when creating the signature and hence an impact on the techniques to be selected among those offered by the selected signature format. A.3.4.2 BSP (p): Cryptographic suites For each signature identified in the concerned workflow (see BSP(a)), this clause shall describe and specify requirements on the robustness of cryptographic suites used to generate or augment electronic signatures. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 23 Guidance provided in ETSI TS 119 312 [i.5], in particular its table 12, should be taken into account. A.3.4.3 BSP (q): Technological environment This clause shall identify the constraints on technologies for the signature creation and signature validation applications and the environments they are used. EXAMPLE: Operating system, programming language, protocols, etc. A.4 Requirements / statements on technical mechanisms and standards implementation A.4.1 Technical counterparts of BSPs - Statement summary For each signature identified in the concerned workflow (as defined in clause A.3.1.1 - BSP(a)), this clause shall summarize the requirements related to the BSPs specified in the previous clauses, and shall specify the corresponding technical mechanisms and standards (counterpart statements) to be implemented by signature creation/validation applications conformant to the applicable signature policy. It shall specify the selected signature format(s) (see [3], [i.8], [i.9], [i.20] to [i.23], [i.25] to [i.28], [i.33] to [i.35]) including details on the format of the signed data, the relative placement of the signature and the signed data (i.e. enveloped, enveloping, detached), the relevance of use of a container to package the signature(s) together with signed data (i.e. ASiC), the specific attributes (signed or unsigned) of the signature, and the expected level of the selected signature format. This clause should use the following signature policy statement summary table, one table being produced per signature identified in the concerned workflow. One single table may however be used when the same set of requirements/statements are applicable to a group of signatures (i.e. the same signature policy applies). ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 24 Table A.1: Signature policy statement summary Name and identifier of the signature policy authority: ...................................................................................... Name and identifier of the signature policy: ....................................................................................................... Identifier of the concerned signature(s) in the concerned signature workflow: .............................................. BSP BSP title Business statement summary Technical statement counterpart (a) Workflow (sequencing & timing) of signatures (b) Data to be signed (DTBS) (c) Relationship between DTBS & signature(s) (d) Targeted community (e) Allocation of responsibility for signature validation and augmentation (f) Legal type of signature (g) Commitment assumed by the signer (h) Level of assurance on timing evidences (i) Formalities of signing (j) Longevity & resilience to change (k) Archival (l) Identity of signers (m) Level of assurance required for the authentication of the signer (n) Signature creation devices (o) Other information to be associated with the signature (p) Cryptographic suites (q) Technological environment Signature creation/validation application practices statements Summary of the selected signature format(s) (e.g. [3], [i.8], [i.9], [i.20] to [i.23], [i.25] to [i.28], [i.33] to [i.35]) including details on the format of the signed data, the relative placement of the signature and the signed data (i.e. enveloped, enveloping, detached), the relevance of use of a container to package the signature(s) together with signed data (i.e. ASiC), the specific attributes (signed or unsigned) of the signature, and the expected level of the selected signature format: ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 25 A.4.2 Input and output constraints for signature creation, augmentation and validation procedures A.4.2.1 Input constraints to be used when generating, augmenting and/or validating signatures in the context of the identified signature policy This clause shall specify the requirements, derived from the BSPs applicable to each signature covered in the policy, on the input of the signature creation procedure, the signature augmentation procedure and/or the signature validation procedure respectively. To this respect, this clause should use table A.2 per concerned signature. NOTE: Table A.2 aims to facilitate deriving respectively signature creation constraints, signature augmentation constraints and signature validation constraints from applicable BSPs statements when considering the set of rules applicable to one or more signatures of the same type to which the same set of rules apply. These constraints and their values will then condition the respective creation, augmentation and validation procedures implemented at the signature creation application (SCA) level or signature validation application (SVA) level, and/or even at the driving application (DA) level as they are defined in [i.4]. Table A.2 corresponds to one or more signatures to which the same rules apply in the context of the concerned signature policy. The header provides the identifier of such a set of signatures and of the signature policy. The first column ("BSP") identifies the applicable BSP. The second column ("BSP Title") identifies the BSP title. The third column ("Business statement summary") and the fourth ("Technical counterpart statement") column summarize respectively the business statements and the counterpart technical statements applicable to the respective BSP. The fifth column ("Constraint(s)") identifies the constraints that can be parameterized with regards to the respective BSP. The sixth column ("Constraint value at signature creation (SCA or DA)") provides, when applicable, the value of the constraints at the level of signature creation (clarifying whether at SCA or DA level). The seventh column ("Constraint value at signature augmentation (SCA, SVA or DA)") provides, when applicable, the value of the constraints at the level of signature augmentation (clarifying whether at SCA, SVA or DA level). The eighth column ("Constraint value at signature validation (SVA or DA)") provides, when applicable, the value of the constraints at the level of signature validation (clarifying whether at SVA or DA level). ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 26 Table A.2 Name and identifier of the signature policy authority: ............................................................................................ Name and identifier of the signature policy: ............................................................................................................. Identifier of the concerned signature(s) in the concerned signature workflow: .................................................... BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (a) Workflow (sequencing & timing) (a)1. OrderInSequence: This constraint indicates requirements on the sequencing order of the applicable signature in the workflow. This may be expressed as "n" out of "m", where "m" is the number of signature (types) considered in the workflow, and last position in the sequence. (a)2. SequencingNature: This constraint indicates the characteristic of the signature with regards to sequencing. Semantic for a possible set of requirement values used to express such requirements is defined as follows: (a)2.1 Mandated-independent: independent signatures are defined as signatures applied to exactly the same data. This constraint indicates that the signature is mandated to be an independent signature. (a)2.2 Mandated-serial: serial signatures are defined as signatures applied to different data and serialized. This constraint indicates that the signature is mandated to be a serial signature. (a)2.3 MandatedUnsignedQProperties-counter-signature: counter signatures are defined as signatures successively applied to the set of previous signatures, and optionally to the same original data. This constraint indicates that the corresponding unsigned qualifying property is mandated to be present in the signature. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 27 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (a)3. TimingRelevance: (a)3.1 TimingRelevanceOnSequencing: This constraint indicates the required relevance of timing with regards to the sequencing of the signatures. Semantic for a possible set of requirement values used to express such requirements is defined as follows: • [not] before a certain date • [not] after a certain date • [not] before a certain amount of time • in exactly a certain amount of time • [not] after a certain amount of time (a)3.2 TimingRelevanceOnEvidence: This constraint indicates the required timing evidence under the form of signed or unsigned qualifying properties that are mandated to be present in the signature. This includes: • (a)3.2.1 MandatedSignedQProperties-signing-time to require from the signer a signed claimed time indication on when the signature has been generated. • (a)3.2.2 MandatedSignedQProperties-content-time-stamp to require time-stamp(s) over the signed data as a whole or over a subset of that data as part of the signed qualifying properties. • (a)3.2.3 MandatedUnsignedQProperties-signature-time-stamp to require a time-stamp on the signature. • (a)3.2.4 MandatedUnsignedQProperties-archival-form to require an archival time-stamp. (a)4. MassSigningAcceptable (yes/no): This constraint indicates whether mass signing is acceptable with regards to the concerned type of signature, expressed as a boolean. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 28 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (b) DTBS (b)1. ConstraintOnDTBS: This constraint indicates requirements on the type of the data to be signed by the signer. (b)2. ContentRelatedConstraintsAsPartOfSignatureElements: This set of constraints indicate the required content related information elements under the form of signed or unsigned qualifying properties that are mandated to be present in the signature. This includes: (b)2.1 MandatedSignedQProperties-DataObjetFormat to require a specific format for the content being signed by the signer. (b)2.2 MandatedSignedQProperties-content-hints to require specific information that describes the innermost signed content of a multi-layer message where one content is encapsulated in another for the content being signed by the signer. (b)2.3 MandatedSignedQProperties-content-reference to require the incorporation of information on the way to link request and reply messages in an exchange between two parties, or the way such link has to be done, etc. (b)2.4 MandatedSignedQProperties-content-identifier to require the presence of, and optionally a specific value for, an identifier that can be used later on in the signed qualifying property "content-reference" attribute. (b)3. DOTBSAsAWholeOrInParts: This constraint indicates whether the whole data or only certain part(s) of it have to be signed. Semantic for a possible set of requirement values used to express such requirements is defined as follows: • whole: the whole data has to be signed; • parts: only certain part(s) of the data have to be signed. In this case additional information should be used to express which parts have to be signed. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 29 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (c) Relationship between DTBS and Signature (c)1. BulkSigningRelevance: This constraint indicates the requirement for signed data referencing mechanisms and in particular for bulk signatures, i.e. when one signature has to sign different data (e.g. through the implementation of signature on several document references consisting in hashes of the referenced documents) or on the contrary its prohibition. Semantic for a possible set of requirement values used to express such requirements is defined as follows: (c)1.1 mandatedBulkSigning; (c)1.2 prohibitedBulkSigning. (c)2. ConstraintsOnTheNumberOfDOTBS: This constraint indicates the requirement on the number of data that one signature can sign. Semantic for a possible set of requirement values used to express such requirements is defined as follows: minValue {<, ≤ , =} x {=, ≥, >} maxValue (c)3. SignatureRelativePosition: This constraint indicates the requirement with regards to the relative position of the signature and the signed data. Semantic for a possible set of requirement values used to express such requirements is defined as follows: • associated; • enveloped; • enveloping; • detached. (c)4. MandatedSignatureFormat: This constraint indicates the required signature format and level (see note of clause A.3.1.3). (d) Targeted community (d)1. TargetedCommunityConstraints: This set of constraints identifies the community to which each document and its (their) signature(s) is (are) addressed and indicates the applicable requirements on that community. It can be used to identify any specific community rules in place. EXAMPLE: These rules could, for instance, state the conditions under which a certain signature can be relied upon, or include provisions relating to the intended effectiveness of signatures, where multiple signatures are required. These rules could greatly impact not only the formats of the signatures and their relationships with the signed documents, but also the specific standards and/or profiles to be used. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 30 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (e) Allocation of responsibility for validation & augmentation (e)1. ValidationRequiredBeforeAugmenting: This constraint indicates whether validation is required before augmenting a signature to an upper level, expressed as a boolean. (e)2. AugmentToLevel: This constraint indicates the level of the signature format to be reached after augmenting a (received) signature. (f) Legal type (f)1. ConstraintsOnCertificateMetadata: This set of constraints indicates requirements on specific certificate metadata. Semantic for a possible set of requirement values used to express such requirements is defined as follows: (f)1.1. LegalPersonSignerRequired: This constraint indicates that the subject entity identified in the signer's certificate used in validating the signature is required to be a legal person; expressed as a boolean. (f)1.2. LegalPersonSignerAllowed: This constraint indicates that the subject entity identified in the signer's certificate used in validating the signature is allowed to be a legal person; expressed as a boolean. Constraints defined in annex C may be used to indicate requirements on specific certificate metadata whose semantic applies in the context of the EU legislation. (g) Commitment type (g)1. CommitmentTypesRequired: This set of constraints indicates the required (possible) values for the commitment to be expressed by the signer and whether this expression is required to be part of the signed qualifying properties. Semantic for a possible set of requirement values used to express such requirements is defined as follows: (g)1.1. MandatedSignedQProperties-commitment-type-indication: This constraint indicates whether the expression of the commitment by the signer is required to be part of the signed qualifying properties; expressed as a boolean. (g)1.2. MandatedCommitmentTypeValues: This constraint indicates the required (possible) values for the commitment type to be expressed by the signer. Semantic for a possible set of requirement values used to express such requirements is defined as follows: • MatchingValuesIndicator: An indication of the requirement on the way the commitment type value(s) in the signature are matched against the required (possible) commitment type values. This matching values indicator may have the following values: − "all" if all of the values shall be met; − "atLeastOne" if at least one of the values shall be met; or − "none" if all the values shall not be met. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 31 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) • CommitmentTypeValues: A non-empty sequence of commitment type identifiers (OIDs or URIs), associated to their multilingual description. (h) LoA on timing evidences (h)1. LoAOnTimingEvidences: This set of constraints indicates the required level of assurance (LoA) on the required timing evidence(s). Semantic for a possible set of requirement values used to express such requirements is defined as follows: (h)1.1. LoA-on-signing-time: This constraint indicates the required LoA on the signing time expressed in the corresponding signed qualifying property. (h)1.2. LoA-on-content-time-stamp: This constraint indicates the required LoA on the content time-stamp expressed in the corresponding signed qualifying property. (h)1.3. LoA-on-signature-time-stamp: This constraint indicates the required LoA on the signature time-stamp expressed in the corresponding un-signed qualifying property. (h)1.4. LoA-on-archival-time-stamp: This constraint indicates the required LoA on the archival time-stamp expressed in the corresponding unsigned qualifying property. (h)1.5. LoA-on-time-in-OCSP-response: This constraint indicates the required LoA on the time expressed in the OCSP response used to support validation of the signer's certificate. (h)1.6. LoA-on-time-in-CRL: This constraint indicates the required LoA on the time expressed in the CRL used to support validation of the signer's certificate. (i) Formalities of signing (i)1. WYSIWYSRequired: This constraint indicates the requirement for having a "what you see is what you sign" environment; expressed as a boolean. (i)2. WYSIWHBSRequired: This constraint indicates the requirement for having a "what you see is what has been signed" environment; expressed as a boolean. (i)3. ProperAdviceAndInformationRequired: This constraint indicates whether it is required providing the user (signer or verifier) with proper advice and information on the signature creation application process and on the legal consequences, as well as a user interface guaranteeing, to the extent possible, a valid legal signature environment; expressed as a boolean. (i)4. UserInterfaceDesignConstraints: This constraint indicates whether it is required designing the user interface to guarantee requirements expressed in clause A.3.2.4.(3) - BSP(i) of the present document; expressed as a boolean. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 32 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (i)5. CorrectValidationAndArchivalProcedures: This constraint indicates whether the SCA and SVA are required to provide (e.g. for display) the relying party (including the signer) with correct procedures for the validation and the archival of the signature and the associated validation data; expressed as a tuple made of a Boolean and an optional character string. (j) Longevity & resilience (j)1. LoAOnLongevityAndResilience: This constraint indicates the required LoA on the longevity and resilience to change expected to apply to the evidence provided by the signature. (k) Archival (k)1. ArchivalConstraints: This constraint indicates the requirements with regards to the archival of the signature and the associated validation data. (l) Identity and role attributes of the signer (l)1. ConstraintsOnCertificateMetadata-LegalPersonSignerRequired: see (f)1.3 (l)2. ConstraintsOnCertificateMetadata-LegalPersonSignerAllowed: see (f)1.4 (l)3. MandatedSignedQProperties-signer-attributes: This constraint indicates whether the signed qualifying property signer- attribute is required and the associated constraints on the required attributes. This can be expressed as a tuple made of a boolean associated with a sequence of identifiers expressing constraints on the required attributes of the signer. Such constraints on signer's attributes or roles may cover: • which roles/attributes are mandated; • identification of those roles/attributes that need to be certified or be present within signed assertions; • constraints on the type of roles/attributes; and • constraints on the values of roles/attributes. This constraint may be used to express whether a proof of authority is required and the associated requirements when required. (l)4. NameConstraints: These constraints indicate requirements on the distinguished names for issued certificates (e.g. to signer, CAs, OCSP responders, CRL Issuers, Time-Stamping Units) as defined in IETF RFC 5280 [i.13]. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 33 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (m) LoA on signer authentication (m)1. X509CertificateValidationConstraints: This set of constraints indicates requirements for use in the certificate path validation process as defined in IETF RFC 5280 [i.13]. These constraints may be different for different certificate types (e.g. certificates issued to signer, to CAs, to OCSP responders, to CRL Issuers, to Time-Stamping Units). Semantic for a possible set of requirement values used to express such requirements is defined as follows: • (m)1.1. SetOfTrustAnchors: This constraint indicates a set of acceptable trust anchors (TAs) as a constraint for the validation process. Such TAs should be provided in the form of (self-signed) certificates (see clause 6.1.1 of IETF RFC 5280 [i.13] on how to treat such certificates as conveyor of TA information) and a time until when these trust anchors were considered reliable. EXAMPLE: The set of TAs can be provided under the form of: − Trust points specified in signature validation policies; − Sets of trusted CAs, e.g. represented by their root certificates stored in the environment (like certificate trust store or list); − Trust Service Status Lists as defined in [i.11]; − Trusted Lists as defined in [i.12]; • (m)1.2. CertificationPath: This constraint indicates a certification path required to be used by the SVA for validation of the signature. The certificate path is of length 'n' from the trust anchor (TA) down to the certificate used in validating a signed object (e.g. the signer's certificate or a time stamping certificate). This constraint can include the path to be considered or indicate the need for considering the path provided in the signature if any. • (m)1.3. user-initial-policy-set: This constraint is as described in IETF RFC 5280 clause 6.1.1 item (c) [i.13]. • (m)1.4. initial-policy-mapping-inhibit: This constraint is as described in IETF RFC 5280 clause 6.1.1 item (e) [i.13]. • (m)1.5. initial-explicit-policy: This constraint is as described in IETF RFC 5280 clause 6.1.1 item (f) [i.13]. • (m)1.6. initial-any-policy-inhibit: This constraint is as described in IETF RFC 5280 clause 6.1.1 item (g) [i.13]. • (m)1.7. initial-permitted-subtrees: This constraint is as described in IETF RFC 5280 clause 6.1.1 item (h) [i.13]. • (m)1.8. initial-excluded-subtrees: This constraint is as described in IETF RFC 5280 clause 6.1.1 item (i) [i.13]. • (m)1.9. path-length-constraints: This constraint indicates restrictions on the number of CA certificates in a certification path [i.13]. This may need to define initial values for this or to handle such constraint differently (e.g. ignore it). ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 34 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) • (m)1.10. policy-constraints: This constraint indicates requirements for certificate policies referenced in the certificates [i.13]. This may need to define initial values for this or to handle such constraint differently (e.g. ignore it). This should also allow the ability to require a (possible set of) specific certificate policy extension value(s) in end-entity certificates (without requiring such values appearing in certificate of authorities in the certification path). (m)2. RevocationConstraints: This set of constraints indicates requirements applicable when verifying the certificate validity status of the certificates during the certificate path validation process [i.13]. These constraints may be different for different certificate types (e.g. certificates issued to signer, to CAs, to OCSP responders, to CRL Issuers, to Time-Stamping Units). Semantic for a possible set of requirement values used to express such requirements is defined as follows: • (m)2.1. RevocationCheckingConstraints: This constraint indicates requirements for checking certificate revocation. Such constraints may specify if revocation checking is required or not and if OCSP responses or CRLs have to be used. Semantic for a possible set of requirement values used to express such requirements is defined as follows: − clrCheck: Checks shall be made against current CRLs (or Authority Revocation Lists); − ocspCheck: The revocation status shall be checked using OCSP IETF RFC 6960 [i.14]; − bothCheck: Both OCSP and CRL checks shall be carried out; − eitherCheck: Either OCSP or CRL checks shall be carried out; − noCheck: No check is mandated. • (m)2.2. RevocationFreshnessConstraints: This constraint indicates time requirements on revocation information. The constraints may indicate the maximum accepted difference between the issuance date of the revocation status information of a certificate and the time of validation (see [i.4]) or require the SVA to only accept revocation information issued a certain time after the signature has been created. • (m)2.3. RevocationInfoOnExpiredCerts: This constraint mandates the signer's certificate used in validating the signature to be issued by a certification authority that keeps revocation notices for revoked certificates even after they have expired for a period exceeding a given lower bound. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 35 BSP BSP title Business statement summary Technical counterpart statement Constraint(s) Constraint value at signature creation (SCA or DA) Constraint value at signature augmentation (SCA, SVA or DA) Constraint value at signature validation (SVA or DA) (m)3. LoAOnTSPPractices: This constraint indicates the required LoA on the practices implemented by the TSP(s) having issued the certificates to be validated during the certificate path validation process [i.13], i.e. the certificates present in the certificate path of the signer's certificate, and optionally those present in all or some of the other certificate chains validated during the signature validation process. (n) Signature Creation Devices (n)1. LoAOnSCD: This constraint indicates the required LoA on the signature creation device in which resides the private key corresponding to the certificates validated during the certificate path validation process [i.13], i.e. the certificates present in the certificate path of the signer's certificate, and optionally those certificates present in all or some of the other certificate chains validated during the signature validation process. (o) Other information to be associated with signatures (o)1. MandatedSignedQProperties-signer-location: This constraint indicates that the signer location is required to be expressed as a signed qualifying property and may additionally express constraints on the value. (o)2. MandatedUnsignedQProperties-signature-policy-extension: This constraint indicates that the signature policy extension is required as an unsigned qualifying property and may additionally express constraints on the values. (o)3. MandatedUnsignedQProperties-signature-policy-inclusion-in- archival-form: This constraint indicates the requirement to include the signature policy document as part of the corresponding unsigned qualifying property. (p) Cryptographic suites (p)1. CryptographicSuitesConstraints: This constraint indicates requirements on algorithms and parameters used when creating signatures or used when validating signed objects included in the validation or augmenting process (e.g. signature, certificates, CRLs, OCSP responses, time-stamps). They will be typically be represented by a list of entries as in table A.3. (q) Technological environment (q)1. TechnologicalEnvironmentConstraints: This constraint indicates the requirements on the technological environment in which signatures are processed. Summary of the selected signature format(s) (e.g. [3], [i.8], [i.9], [i.20] to [i.23], [i.25] to [i.28], [i.33] to [i.35]) including details on the format of the signed data, the relative placement of the signature and the signed data (e.g. enveloped, enveloping, detached), the relevance of use of a container to package the signature(s) together with signed data, the specific attributes (signed or unsigned) of the signature, and the expected level of selected signature format. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 36 Table A.3 (p)1. Cryptographic-constraints Type of signature Algorithm identifiers Minimum signature key size Minimum length of hash value Expiration date Signature to be validated Signer's certificate CA certificate in a valid chain Time-Stamp Token OCSP response CRLs A.4.2.2 Output constraints to be used when validating signatures in the context of the identified signature policy This clause shall specify the requirements, derived from the BSPs applicable to each signature covered in the policy, on the output of the signature validation procedure. To this respect, this clause should use the table A.4 per concerned signature. Table A.4 Constraints to be used as output for validating signatures in the context of the identified signature policy Name and identifier of the signature policy issuer: .................................................................................................................................... Name and identifier of the signature policy: .................................................................................................................................... Identifier of the concerned signature(s) in the concerned signature workflow: ..................................................................................................................................... A. ... title ... General constraints Signature policy values ... A.4.2.3 Output constraints to be used for generating/augmenting signatures in the context of the identified signature policy This clause shall specify the requirements, derived from the BSPs applicable to each signature covered in the policy, on the output of the signature creation/augmentation procedure. To this respect, this clause should use table A.5 per concerned signature. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 37 Table A.5 Constraints to be used as input for generating/augmenting signatures in the context of the identified signature policy Name and identifier of the signature policy issuer: ........................................................................................................................... Name and identifier of the signature policy: ........................................................................................................................... Identifier of the concerned signature(s) in the concerned signature workflow: ........................................................................................................................... A. ... title ... General constraints Signature policy values ... ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 38 A.5 Other business and legal matters This clause shall describe and specify general business and legal matters that would not fit in the previous clauses while being of importance for the specifications and policy description of signature use in the considered business process scenario, such as: 1) Consent to accept signatures: Indication whether the parties' consent to accept signature is actual or deemed. E.g. consent can be required by the laws of some jurisdictions, and can be revoked on notice to the other party. 2) Audience conditions: Indication of the conditions under which a signature can be relied upon. E.g. the signature is only valid in a specified jurisdiction, or where laws exist which recognize the legal validity of signatures created under conditions as specified in the policy, etc. 3) Applicable fees. 4) Financial responsibility. 5) Confidentiality of business information. 6) Privacy of personal information. 7) Intellectual property rights. 8) Representations and warranties. 9) Disclaimers of warranties. 10) Limitations of liability. 11) Indemnities. 12) Term and termination. 13) Individual notices and communications with participants. 14) Amendments. 15) Dispute resolution procedures. 16) Governing law. 17) Compliance with applicable law. 18) Miscellaneous provisions (e.g. entire agreement, assignment, severability, enforcement, force majeure). 19) Other provisions. NOTE: The scope and description of the above listed matters is similar to the ones described in clause 4.9 of IETF RFC 3647 [i.24] transposed to the context of signature policies and signature policy documents. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 39 A.6 Compliance audit and other assessments This clause shall indicate: a) whether signature creation/validation applications claiming compliance with the signature policy document and all or some of the signature policies it covers are required to pass a compliance audit and/or other types of assessments to confirm claimed compliance; and b) whether determining if one or more separate signature policies are allowed to be subordinated, included in or include a signature policy defined in the signature policy document, requires a compliance audit and/or other types of assessments. It shall describe and specify accordingly the following: 1) The list of topics covered by the audit/assessment and/or the audit/assessment methodology used to perform the assessment. 2) Frequency of compliance audit or other assessments: i) for each subordinate signature policy to be assessed pursuant to a signature policy, or the circumstances that will trigger such an assessment; ii) for each application to be assessed pursuant to the signature policy or a compliant (subordinate) signature policy, or the circumstances that will trigger such an assessment. EXAMPLE 1: Possibilities include an annual audit, pre-operational assessment as a condition of allowing an entity to be operational, or investigation following a possible or actual compromise of security. 3) The identity and/or qualifications of the personnel performing the audit or other assessment. 4) The relationship between the assessor and the entity being assessed, including the degree of independence of the assessor. 5) Actions taken as a result of deficiencies found during the assessment. EXAMPLE 2: A temporary suspension of operations until deficiencies are corrected, triggering special investigations or more frequent subsequent compliance assessments, and claims for damages against the assessed entity. 6) Who is entitled to see results of an assessment (e.g. assessed entity, other participants, the general public), who provides them (e.g. the assessor or the assessed entity), and how they are communicated. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 40 Annex B (normative): Commitment types The following generic commitment types are defined in the present document: 1) Proof of origin - Description: It indicates that the signer recognizes to have created, approved and sent the signed data. - Object identifier: id-cti-ets-proofOfOrigin OBJECT IDENTIFIER ::= { iso(1) member-body(2)us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6) 1} - URI: The URI for this commitment is http://uri.etsi.org/01903/v1.2.2#ProofOfOrigin. 2) Proof of receipt - Description: It indicates that signer recognizes to have received the content of the signed data. - Object identifier: id-cti-ets-proofOfReceipt OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6) 2} - URI: The URI for this commitment is http://uri.etsi.org/01903/v1.2.2#ProofOfReceipt. 3) Proof of delivery - Description: It indicates that the TSP providing that indication has delivered a signed data in a local store accessible to the recipient of the signed data. - Object identifier: id-cti-ets-proofOfDelivery OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6) 3} - URI: The URI for this commitment is http://uri.etsi.org/01903/v1.2.2#ProofOfDelivery. 4) Proof of sender - Description: It indicates that the entity providing that indication has sent the signed data (but not necessarily created it). - Object identifier: id-cti-ets-proofOfDelivery OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6) 3} - URI: The URI for this commitment is http://uri.etsi.org/01903/v1.2.2#ProofOfSender. 5) Proof of approval - Description: It indicates that the signer has approved the content of the signed data. - Object identifier: id-cti-ets-proofOfApproval OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6) 5} - URI: The URI for this commitment is http://uri.etsi.org/01903/v1.2.2#ProofOfApproval. 6) Proof of creation - Description: It indicates that the signer has created the signed data (but not necessarily approved, nor sent it). - Object identifier: id-cti-ets-proofOfCreation OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6) 6} - URI: The URI for this commitment is http://uri.etsi.org/01903/v1.2.2#ProofOfCreation. Any organization may choose to create its own URIs and OIDs for its own specific purposes commitment types. Any organization may request an object identifier under the etsi-identified organization node or a URI root as detailed on https://portal.etsi.org/PNNS.aspx. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 41 Annex C (normative): Constraints in the context of EU legislation The following constraints indicates requirements on specific certificate metadata whose semantic applies in the context of the EU legislation: a) EUQualifiedCertificateRequired: This constraint indicates that the signer's certificate used in validating the signature is required to be a qualified certificate as defined in the applicable EU legislation; expressed as a boolean. b) EUQualifiedCertificateSigRequired: This constraint indicates that the signer's certificate used in validating the signature is required to be a qualified certificate for electronic signature as defined in [i.1]; expressed as a boolean. c) EUQualifiedCertificateSealRequired: This constraint indicates that the signer's certificate used in validating the signature is required to be a qualified certificate for electronic seal as defined in [i.1]; expressed as a boolean. d) EUSSCDRequired: This constraint indicates that the private key corresponding to the public key in the signer's certificate used in validating the signature is required to reside in an secure signature creation device as defined in [i.1]; expressed as a boolean. e) EUAdESigRequired: This constraint indicates that the signature is required to be an advanced electronic signature as defined in the applicable EU legislation; expressed as a boolean. f) EUAdESealRequired: This constraint indicates that the signature is required to be an advanced electronic seal as defined in [i.1]; expressed as a boolean. g) EUQSigCDRequired: This constraint indicates that the private key corresponding to the public key in the signer's certificate used in validating the signature is required to reside in a qualified signature creation device as defined in [i.1]; expressed as a boolean. h) EUQSealCDRequired: This constraint indicates that the private key corresponding to the public key in the signer's certificate used in validating the signature is required to reside in a qualified seal creation device as defined in [i.1]; expressed as a boolean. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 42 Annex D (normative): Signature application practices statements D.1 General requirements When the policy and security practices requirements applicable to SCA and/or SVA are included explicitly in the signature policy document (see clause A.2), the table of content of this clause shall be as specified in clause D.2 with the numbering of the clauses of the table of content appearing in the signature policy document is obtained by removing the starting "D.". This clause shall describe a set of rules applicable to the application and/or its environment implementing the creation, the augmentation and/or the validation of signatures. It shall cover rules with regards to the practices used by the application and its environment to properly implement the generation, augmentation and/or validation of signatures. EXAMPLE 1: A community of users can define as part of a signature policy the applicable requirements with regards to those practices any application will have to meet in order to comply with the community signature policy. EXAMPLE 2: A signature policy can also refer to an external set of practices statements that describes the practices used by an application or an application provider that generate/validate signatures according to several signature policies defined by several communities of users. EXAMPLE 3: A signature policy can also be defined in the context of a specific legal context and define a set of rules to create or validate a signature meeting specific legal requirements (e.g. a qualified electronic signature as defined in the applicable European legislation framework) including specific requirements on signature creation applications (SCAs) and signature validation applications (SVAs) and their environments. This clause shall include, either by reference or explicitly, the set of policy and security practices requirements that the SCA and/or the SVA will have to meet when generating, augmenting and/or validating signatures in compliance with the signature policy document. D.2 Signature application practices statements D.2.1 Legal driven policy requirements This clause shall contain requirements, control objectives and controls in connection with: 1) the processing of personal data; 2) the significance of digital signatures; and 3) the business continuity. D.2.2 Information security (management system) requirements This clause shall contain requirements, control objectives and controls in connection with information security and information security management systems, and in particular: 1) security policy(ies); 2) network protection; 3) information system protection; 4) software integrity of the application; 5) data storage security; and ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 43 6) audit trail security. NOTE: The above controls are mainly addressing service providers integrating SCA/SVA components. These latter can implement information security based on ISO/IEC 27001 [i.6] and ISO/IEC /27002 [i.7]. D.2.3 Signature Creation and Signature Validation processes requirements This clause shall contain requirements, control objectives and controls in connection with: 1) signature creation process and systems, and in particular: a) data content type management; b) signature attribute viewer; c) timing and sequencing enforcement; d) signature invocation; e) selection of the level of signature longevity; f) signer's authentication procedure and access control management; g) DTBS preparation; h) DTBS representation; i) signature creation device management; j) protection of the communication between signature creation device and SCA; k) robustness of signature cryptographic suites; l) community adaptability; and m) bulk signing operation. 2) signature validation process and systems; and in particular: a) validation process rules enforcement; b) validation user interface; c) appropriate format of the signature; d) lifetime of the signature; and e) validation input/output relative conformance (i.e. correctness of the implemented validation procedure). D.2.4 Development & coding policy requirements This clause shall contain requirements, control objectives and controls in connection with the development and coding policies, in particular with: 1) the secure development methods; and 2) testing compliance and interoperability. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 44 D.2.5 General requirements This clause shall contain other general requirements, control objectives and controls in connection with: 1) the user interface; 2) the interface to external trust service providers; and 3) general security measures. ETSI ETSI TS 119 172-1 V1.1.1 (2015-07) 45 History Document history V1.1.1 July 2015 Publication
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
1 Scope
|
The present document defines the sets of checks required for testing conformance of ASiC containers against: • ASiC containers conforming to building blocks defined in ETSI EN 319 162-1 [1] and containing extended CAdES [i.5] and extended XAdES [i.6] digital dignatures, expanding the scope of ASiC baseline containers also defined in ETSI EN 319 162-1 [1]; and • additional containers defined in ETSI EN 319 162-2 [2]. The set of checks that are common with ASiC baseline containers, are defined in ETSI TS 119 164-4 [5] and referenced when needed.
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
2 References
| |
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI EN 319 162-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC baseline containers". [2] ETSI EN 319 162-2: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 2: Additional ASiC containers". [3] ETSI TS 119 124-5: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 5: Testing conformance of extended CAdES signatures". [4] ETSI TS 119 134-5: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures - Testing Compliance & Interoperability; Part 5: Conformance Testing for XAdES Baseline Profile". [5] ETSI TS 119 164-4: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC) - Testing Compliance and Interoperability; Part 4: Testing conformance of ASiC baseline containers".
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] OASIS: "Test Assertions Guidelines Version 1.0", 19 June 2013. OASIS Committee Note 02. NOTE: Available at http://docs.oasis-open.org/tag/guidelines/v1.0/cn02/guidelines-v1.0-cn02.html. ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 6 [i.2] ETSI TR 119 164-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC) - Testing Conformance and Interoperability; Part 1: Overview". [i.3] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations". [i.4] ETSI EN 319 122-2: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 2: Extended CAdES signatures". [i.5] ETSI EN 319 132-2: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 2: Extended XAdES signatures". [i.6] IETF RFC 3161: "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)". [i.7] IETF RFC 5816: "ESSCertIDv2 Update for RFC 3161". [i.8] IETF RFC 4998: "Evidence Record Syntax (ERS)". [i.9] IETF RFC 6283: "Extensible Markup Language Evidence Record Syntax (XMLERS)". [i.10] OASIS: "Open Document Format for Office Applications (OpenDocument) Version 1.2; Part 3: Packages" 29 September 2011. [i.11] ISO/IEC TS 30135 (all parts): "Information technology -- Digital publishing -- EPUB3".
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
3 Definitions and abbreviations
| |
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
3.1 Definitions
|
For the purposes of the present document, the terms and definitions given in ETSI TR 119 001 [i.3] and in the Test Assertions Guidelines [i.1] apply. In case of contrast the former prevails.
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
3.2 Abbreviations
|
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.3] and the following apply: ACS Additional Container Structure PKI Public Key Infrastructure ACSC Additional Container Syntactical Conformance ACST Additional Container Signature or Time-stamp token TA Test Assertion NOTE: Refer to [i.1]. TAL Test Assertion List NOTE: Refer to [i.1]. TC Test Case URI Uniform Resource Identifier ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 7 4 ASiC additional container conformity test specification overview The present document complements ETSI TS 119 164-4 [5] (conformance testing of ASiC baseline containers) by specifying tests to be performed for testing conformance of ASiC containers supporting specific requirements not supported by ASiC baseline containers but still complying with the ASiC building blocks specified in ETSI EN 319 162-1 [1]. This clause describes the overall approach used for testing conformance of these additional containers. In particular ASiC additional containers, in scope of the present document, shall be: 1) ASiC additional containers obtained by expanding in scope ASiC baseline containers, in conformance to the ASiC building blocks specified in ETSI EN 319 162-1 [1] clause 4 and allowing use of extended CAdES signatures (ETSI EN 319 122-2 [i.4]) and extended CAdES signatures (ETSI EN 319 132-2 [i.5]); or 2) ASiC additional containers specified in ETSI EN 319 162-2 [2]. The conformance test are defined: • extending ETSI TS 119 164-4 [5] with conformance tests defined for extended CAdES digital signatures in ETSI TS 119 124-5 [3] and conformance tests defined for extended XAdES digital signatures defined in ETSI TS 119 134-5 [4]; and • defining conformance tests considering the additional container types specified in ETSI EN 319 162-2 [2]. The conformance test definitions are based on test assertions work produced by OASIS in "Test Assertions Guidelines Version 1.0" [i.1]. Each test assertion includes the following information: 1) Unique identifier for further referencing. 2) Reference to the Normative source for the test. 3) The Target of the assertion. 4) The Prerequisite specifies the conditions under which the TA is applicable/can be performed. 5) Predicate fully and unambiguously defining the assertion to be tested. 6) Prescription level: Three levels are defined: mandatory, recommended and permitted, whose semantics is to be interpreted as described in clause 3.1.2 of [i.1]. 7) Tag: information on the element tested by the assertion. 5 Testing Simple Associated Signature Containers (ASiC-S)
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
5.1 Test Assertions for ASiC-S
| |
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
5.1.1 ASiC-S test assertions for Additional Container Structure
|
All the test assertions related to the first conformance layer, the Additional Container Structure (ACS), are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-S/ACS List Description: all TAs describing ACS requirements for ASiC-S additional containers List Members: TA/ASiC-S/ACS/1 ... 6 ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 8 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/ACS/1 Normative Source: ASiC ETSI EN 319 162-1 [1] clause 4.2 item 1 and 2 Target: ASiC generator claiming conformance to ASiC-S additional container Predicate: The ZIP format, with the limitations specified in the Normative Source referred above, shall be used to bind the contained objects into a single container Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-S additional container TA id: TA/ASiC-S/ACS/2 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.1 item 2 Target: ASiC generator claiming conformance to ASiC-S additional container Predicate: ASiC File extension is “.asics” or “.scs” if the operating systems and/or file systems do not allow more than 3 characters file extensions or “.zip”. Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-S additional container TA id: TA/ASiC-S/ACS/3 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.1 item 3 Target: ASiC generator claiming conformance to ASiC-S additional container Predicate: The comment field in the ZIP file header is set with “mimetype=” followed by the media type of the data held in the file. Prescription Level: permitted Tag: conformance layer = 1 (ACS); Container type = ASiC-S additional container TA id: TA/ASiC-S/ACS/4 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.1 item 1 and clause A.1 Target: ASiC generator claiming conformance to ASiC-S additional container Predicate: mimetype is encoded as specified in ETSI EN 319 162-1 [1] clause A.1 and is set according to clause 4.3.3.1 item 1. Prescription Level: mandatory if file extension is “.zip”; else recommended Tag: conformance layer = 1 (ACS); Container type = ASiC-S additional container TA id: TA/ASiC-S/ACS/5 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 3 and 4 Target: ASiC generator claiming conformance to ASiC-S additional container Predicate: META-INF folder is present and contains one file named timestamp.tst, signature.p7s, signatures.xml, "evidencerecord.ers" or "evidencerecord.xml". Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-S additional container TA id: ASiC-S/ACS/6 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 Target: ASiC generator claiming conformance to ASiC-S additional container Predicate: a single file object, in addition to the optional mimetype, is present in the root folder. Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-S additional container 5.1.2 ASiC-S test assertions for Additional Container Syntactical Conformance All the test assertions related to the second conformance layer, the Additional Container Syntactical Conformance (ACSC), are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-S/ACSC List Description: all TAs describing ACSC requirements for ASiC-S containers - see clause 4.3 of ETSI EN 319 162-1 [1] List Members: TA/ASiC-S/ACSC/1 ... 8 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/ACSC/1 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4b and ETSI TS 119 124-5 [3] clause 5 Target: ASiC generator claiming conformance to ASiC-S with CAdES additional container Prerequisite: TAL/ASiC-S/ACS conformance verified and the expected input is ASiC-S CAdES. Predicate: signature.p7s is present and fulfils the requirements specified in clause 5 of ETSI TS 119 124-5 [3]. Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S with CAdES additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 9 TA id: TA/ASiC-S/ACSC/2 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 5 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TAL/ASiC-S/ACS conformance verified and the expected input is ASiC-S XAdES. Predicate: signatures.xml is present, conformant to the schema specified in ETSI EN 319 162-1 [1] §A.5 and each ds:Signature element that is present fulfils the requirements specified in clause 5 of ETSI TS 119 134-5 [4] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACSC/3 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items a) and c) Target: ASiC generator claiming conformance to ASiC-S Time assertion additional container Prerequisite: TAL/ASiC-S/ACS conformance verified the expected input is ASiC-S Time assertion with a time-stamp token Predicate: timestamp.tst compliant with IETF RFC 3161 [i.6] as updated by IETF RFC 5816 [i.7] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S Time assertion additional container TA id: TA/ASiC-S/ACSC/4 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 item d) and ETSI EN 319 162-1 [1] clause A.7 Target: ASiC generator claiming conformance to ASiC-S Time assertion additional container Prerequisite: TAL/ASiC-S/ACS and TA/ASiC-S/ACSC/3 conformance verified the expected input is ASiC-S Time assertion with a time-stamp token and long term attributes Predicate: one or more ASiCArchiveManifest files are present and conforms to comply with ASiC part 1 [2], clause A.7 Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S Time assertion additional container TA id: TA/ASiC-S/ACSC/5 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 item d) Target: ASiC generator claiming conformance to ASiC-S Time assertion additional container Prerequisite: TA/ASiC-S/ACSC/4 conformance verified the expected input is ASiC-S Time assertion with a time-stamp token and long term attributes Predicate: one *timestamp*.tst for each ASiCArchiveManifest file is present whose actual file name matches the value of the URI attribute of the SigReference element. Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S Time assertion additional container TA id: TA/ASiC-S/ACSC/6 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 item d) Target: ASiC generator claiming conformance to ASiC-S Time assertion additional container Prerequisite: TA/ASiC-S/ACSC/5 conformance verified the expected input is ASiC-S Time assertion with a time-stamp token and long term attributes Predicate: each *timestamp*.tst is compliant with IETF RFC 3161 [i.6] as updated by IETF RFC 5816 [i.7] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S Time assertion additional container TA id: TA/ASiC-S/ACSC/7 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items a) and c) Target: ASiC generator claiming conformance to ASiC-S Time assertion additional container Prerequisite: TAL/ASiC-S/ACS conformance verified the expected input is ASiC-S time assertion with evidencerecord.ers present Predicate: evidencerecord.ers compliant with IETF RFC 4998 [i.8] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S Time assertion additional container TA id: TA/ASiC-S/ACSC/8 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items a) and c) Target: ASiC generator claiming conformance to ASiC-S Time assertion additional container Prerequisite: TAL/ASiC-S/ACS conformance verified the expected input is ASiC-S time assertion with evidencerecord.xml present Predicate: evidencerecord.xml compliant with IETF RFC 6283 [i.9] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-S Time assertion additional container
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
5.1.3 Test assertions for ASiC-S ACST conformance
|
All the test assertions related to the third conformance layer, the Additional Container Signature or Timestamp token (ACST) conformance, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-S/ACST List Description: all TAs describing ACST conformance requirements for ASiC-S additional containers List Members: TA/ASiC-S/ACST/1 ... 16 ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 10 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/ACST/1 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4b and ETSI TS 119 124-5 [3] clause 5 Target: ASiC generator claiming conformance to ASiC-S with CAdES additional container Prerequisite: TA/ASiC-S/ACSC/1 conformance verified Predicate: signature.p7s is conformant to CAdES-E-BES and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with CAdES additional container The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/ACST/2 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4b and ETSI TS 119 124-5 [3] clause 6 Target: ASiC generator claiming conformance to ASiC-S with CAdES additional container Prerequisite: TA/ASiC-S/ACSC/1 conformance verified Predicate: signature.p7s is conformant to CAdES-E-EPES and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with CAdES additional container The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/ACST/3 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4b and ETSI TS 119 124-5 [3] clause 7 Target: ASiC generator claiming conformance to ASiC-S with CAdES additional container Prerequisite: TA/ASiC-S/ACSC/1 conformance verified Predicate: signature.p7s is conformant to CAdES-E-T and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with CAdES additional container The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/ACST/4 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4b and ETSI TS 119 124-5 [3] clause 8 Target: ASiC generator claiming conformance to ASiC-S with CAdES additional container Prerequisite: TA/ASiC-S/ACSC/1 conformance verified Predicate: signature.p7s is conformant to CAdES-E-A and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with CAdES additional container TA id: TA/ASiC-S/ACST/5 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 5 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-BES and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/6 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 6 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-EPES and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/7 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 7 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-T and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/8 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 8 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-C and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 11 TA id: TA/ASiC-S/ACST/9 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 9 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-X and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/10 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 10 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-X-L and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/11 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 11 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-X-Long and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/12 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 12 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-A and the signature is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-S/ACST/13 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items a) and c) Target: ASiC generator claiming conformance to ASiC-S with Time Assertion additional container Prerequisite: TA/ASiC-S/ACSC/3 conformance verified Predicate: timestamp.tst is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with Time Assertion additional container TA id: TA/ASiC-S/ACST/14 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items d) Target: ASiC generator claiming conformance to ASiC-S with Time Assertion additional container Prerequisite: TA/ASiC-S/ACSC/6 conformance verified Predicate: each *timestamp*.tst is cryptographically correct against the content of the ASiCArchiveManifest file that reference it with the URI attribute of the SigReference element Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with Time Assertion additional container TA id: TA/ASiC-S/ACST/15 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items a) and c) Target: ASiC generator claiming conformance to ASiC-S with Time Assertion additional container Prerequisite: TA/ASiC-S/ACSC/7 conformance verified Predicate: evidencerecord.ers is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with Time Assertion additional container TA id: TA/ASiC-S/ACST/16 Normative Source: ETSI EN 319 162-2 [2] clause 4.2.1 items a) and c) Target: ASiC generator claiming conformance to ASiC-S with Time Assertion additional container Prerequisite: TA/ASiC-S/ACSC/8 conformance verified Predicate: evidencerecord.ers is cryptographically correct against the content of the file object found in TA/ASiC-S/ACS/5 Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with Time Assertion additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 12 6 Testing Extended Associated Signature Containers (ASiC-E)
|
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
6.1 Test Assertions for ASiC-E
| |
17a2a97dcbe9d5d8646e31e80c15cecd
|
119 164-5
|
6.1.1 ASiC-E test assertions for Additional Container Structure
|
All the test assertions related to the first conformance layer, the Additional Container Structure (ACS), are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-E/ACS List Description: all TAs describing ACS requirements for ASiC-E additional containers List Members: TA/ASiC-E/ACS/1 ... 5 The Test Assertions for this conformance layer are specified as follows. TA id: TA/ASiC-E/ACS/1 Normative Source: ASiC ETSI EN 319 162-1 [1] clause 4.2 item 1 and 2 Target: ASiC generator claiming conformance to ASiC-E additional container Predicate: The ZIP format, with the limitations specified in the Normative Source referred above, shall be used to bind the contained objects into a single container Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-E additional container TA id: TA/ASiC-E/ACS/2 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.1 item 1 Target: ASiC generator claiming conformance to ASiC-E additional container Predicate: ASiC File extension is “.asice” (or “.sce” if the operating systems and/or file systems do not allow more than 3 characters file extensions) Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-E additional container TA id: TA/ASiC-E/ACS/3 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.1 item 3 Target: ASiC generator claiming conformance to ASiC-E additional container Predicate: The comment field in the ZIP file header is set with “mimetype=” followed by the mime type of the file object within the container Prescription Level: permitted Tag: conformance layer = 1 (ACS); Container type = ASiC-E additional container TA id: TA/ASiC-E/ACS/4 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.1 item 2 and clause A.1 Target: ASiC generator claiming conformance to ASiC-E additional container Predicate: mimetype contains the media type defined in ETSI EN 319 162-1 [1] clause 4.4.3.1 item 2 and is encoded as specified in ETSI EN 319 162-1 [1] clause A.1 Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-E additional container TA id: TA/ASiC-E/ACS/5 Normative Source: ETSI EN 319 162-1 [1] clause 6.2.2 item 2 Target: ASiC generator claiming conformance to ASiC-E additional container Predicate: META-INF folder is present and contains either in an arbitrary path one or more file objects whose name contains the word “signatures” and has the extension “.xml”; or one or more file objects whose name contains the word “signature” and has the extension “.p7s”; or one or more file objects whose name contains the word “timestamp” and has the extension “.tst”; or zero or more ASiCManifest files; or zero or more ASiCEvidenceRecordManifest files Prescription Level: mandatory Tag: conformance layer = 1 (ACS); Container type = ASiC-E additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 13 6.1.2 ASiC-E test assertions for Additional Container Syntactical Conformance All the test assertions related to the second conformance layer, the Additional Container Syntactical Conformance (ACSC), are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-E/ACSC List Description: all TAs describing ACSC requirements for ASiC-E additional containers List Members: TA/ASiC-E/ACSC/1 ... 11 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-E/ACSC/1 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 3 and ETSI TS 119 134-5 [4] clause 5 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Predicate: one or more *signatures*.xml files are present and their content is compliant with ETSI EN 319 162-1 [1] clause 4.4.3.2 items 3a, 3b, 3c, 3d or 3e; each ds:Signature element that is present in the *signatures*.xml files fulfils the requirements specified in clause 5 of ETSI TS 119 134-5 [4] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACSC/2 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 5a Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: the expected input is ASiC-E XAdES that includes the META-INF/container.xml Predicate: META-INF folder is present and contains a well formed container.xml, as defined in ISO/IEC TS 30135 [i.11] clause 3.5.1 Prescription Level: permitted Tag: conformance layer = 2 (ACSC); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACSC/3 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 5b Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: the expected input is ASiC-E XAdES that includes the META-INF/manifest.xml Predicate: META-INF folder is present and contains a well formed manifest.xml, as defined in OASIS Open Document Format specifications [i.10] Prescription Level: permitted Tag: conformance layer = 2 (ACSC); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACSC/4 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 5c Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: the expected input is ASiC-E XAdES that includes the META-INF/metadata.xml Predicate: META-INF folder is present and contains a well formed metadata.xml, as defined in ISO/IEC TS 30135 [i.11] clause 3.5.1 Prescription Level: permitted Tag: conformance layer = 2 (ACSC); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACSC/5 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.4.2 item 2 Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TAL/ASiC-E/ACS Predicate: one or more ASiCManifest files are present, conformant to the schema specified in ETSI EN 319 162-1 [1] clause A.4 Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container TA id: TA/ASiC-E/ACSC/6 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.4.2 item 3a and 3b Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TA/ASiC-E/ACSC/5 Predicate: the URI attribute value of SigReference element in each ASiCManifest file refers to one *signature*.p7s or one *timestamp*.tst that is present in the container Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 14 TA id: TA/ASiC-E/ACSC/7 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.5 item 2a and clause A.7 Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TA/ASiC-E/ACSC/6 conformance verified the expected input is ASiC-E with CAdES or Time assertion with long term attributes Predicate: one or more ASiCArchiveManifest files are present and conforms to ETSI EN 319 162-2 [2] clause A.7 item 1b Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container TA id: TA/ASiC-E/ACSC/8 Normative Source: ETSI EN 319 162-2 [2] clause A.7 item 1c Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TA/ASiC-E/ACSC/7 conformance verified Predicate: one *timestamp*.tst for each ASiCArchiveManifest file is present whose actual file name matches the value of the URI attribute of the SigReference element. Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container TA id: TA/ASiC-E/ACSC/9 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.5 item 2a Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TA/ASiC-S/ACSC/8 conformance verified the expected input is ASiC-E with CAdES or Time Assertion with a time-stamp token and long term attributes Predicate: each *timestamp*.tst is compliant with IETF RFC 3161 [i.6] as updated by IETF RFC 5816 [i.7] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container TA id: TA/ASiC-E/ACSC/10 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.5 item 2b Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TAL/ASiC-S/ACS conformance verified the expected input is ASiC-E with CAdES or Time Assertion with ASiCEvidenceRecordManifest and evidencerecord.ers present Predicate: ASiCEvidenceRecordManifest is compliant with ETSI EN 319 162-1 [1] clause 4.4.5 item 2b and evidencerecord.ers compliant with IETF RFC 4998 [i.8] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container TA id: TA/ASiC-E/ACSC/11 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.5 item 2b Target: ASiC generator claiming conformance to ASiC-E with CAdES or Time Assertion additional container Prerequisite: TAL/ASiC-S/ACS conformance verified the expected input is ASiC-E with CAdES or Time Assertion with ASiCEvidenceRecordManifest and evidencerecord.xml present Predicate: ASiCEvidenceRecordManifest is compliant with ETSI EN 319 162-1 [1] clause 4.4.5 item 2b and evidencerecord.xml compliant with IETF RFC 6283 [i.9] Prescription Level: mandatory Tag: assertion layer = 2 (ACSC); Container type = ASiC-E with CAdES or Time Assertion additional container 6.1.3 Test assertions for ASiC-E Additional Container Signature or Timestamp token conformance All the test assertions related to the third conformance layer, the Additional Container Signature or Timestamp token (ACST) conformance, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-E/ACST List Description: all TAs describing ACST conformance requirements for ASiC-E additional containers List Members: TA/ASiC-E/ACST/1 ... ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 15 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-E/ACST/1 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 5 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-E/ACSC/1 conformance verified Predicate: signatures.xml is conformant to XAdES-E-BES and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACST/2 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 6 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-E/ACSC/1 conformance verified Predicate: signatures.xml is conformant to XAdES-E-EPES and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACST/3 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 7 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-E/ACSC/1 conformance verified Predicate: signatures.xml is conformant to XAdES-E-T and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACST/4 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 8 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-E/ACSC/1 conformance verified Predicate: signatures.xml is conformant to XAdES-E-C and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACST/5 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 9 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-E/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-X and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACST/6 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 10 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-X-L and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container TA id: TA/ASiC-E/ACST/7 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 11 Target: ASiC generator claiming conformance to ASiC-E with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-X-Long and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with XAdES additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 16 TA id: TA/ASiC-E/ACST/8 Normative Source: ETSI EN 319 162-1 [1] clause 4.3.3.2 item 4c and ETSI TS 119 134-5 [4] clause 12 Target: ASiC generator claiming conformance to ASiC-S with XAdES additional container Prerequisite: TA/ASiC-S/ACSC/2 conformance verified Predicate: signatures.xml is conformant to XAdES-E-A and the signature is cryptographically correct against the content of the data files either directly referenced by each signature with a set of ds:Reference elements or indirectly referenced using a signed ds:Manifest object that is pointed by a ds:Reference Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-S with XAdES additional container TA id: TA/ASiC-E/ACST/9 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 5 Target: ASiC generator claiming conformance to ASiC-E with CAdES additional container Prerequisite: TA/ASiC-E/ACSC/6 conformance verified and *signature*.p7s is present Predicate: signatures.xml is conformant to CAdES-E-BES and the signature is cryptographically correct against the content of the data files referenced by the ASiCManifest file Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with CAdES additional container TA id: TA/ASiC-E/ACST/10 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 6 Target: ASiC generator claiming conformance to ASiC-E with CAdES additional container Prerequisite: TA/ASiC-E/ACSC/6 conformance verified and *signature*.p7s is present Predicate: signatures.xml is conformant to CAdES-E-EPES and the signature is cryptographically correct against the content of the data files referenced by the ASiCManifest file Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with CAdES additional container TA id: TA/ASiC-E/ACST/11 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 7 Target: ASiC generator claiming conformance to ASiC-E with CAdES additional container Prerequisite: TA/ASiC-E/ACSC/6 conformance verified and *signature*.p7s is present Predicate: signatures.xml is conformant to CAdES-E-T and the signature is cryptographically correct against the content of the data files referenced by the ASiCManifest file Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with CAdES additional container TA id: TA/ASiC-E/ACST/12 Normative Source: ETSI EN 319 162-1 [1] clause 4.4.3.2 item 2 and ETSI TS 119 134-5 [4] clause 8 Target: ASiC generator claiming conformance to ASiC-E with CAdES additional container Prerequisite: TA/ASiC-E/ACSC/6 conformance verified and *signature*.p7s is present Predicate: signatures.xml is conformant to CAdES-E-A and the signature is cryptographically correct against the content of the data files referenced by the ASiCManifest file Prescription Level: mandatory Tag: assertion layer = 3 (ACST); Container type = ASiC-E with CAdES additional container ETSI ETSI TS 119 164-5 V1.1.1 (2016-06) 17 History Document history V1.1.1 June 2016 Publication
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
1 Scope
|
The present document defines the set of checks to be performed for testing conformance of ASiC containers against ASiC baseline containers as specified in ETSI EN 319 162-1 [1]. The present document does not specify checks leading to conclude whether a container is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in signatures inside the container may be considered valid or not). In consequence, no conclusion may be inferred regarding the technical validity of a container that has been successfully tested by any tool conformant to the present document. Checks are exclusively constrained to elements specified by ASiC [1]. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by ASiC [1].
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
2 References
| |
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI EN 319 162-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC baseline containers". [2] ETSI TS 119 124-4: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 4: Testing conformance of CAdES baseline signatures". [3] ETSI TS 119 134-4: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures - Testing Conformance and Interoperability; Part 4: Testing Conformance of XAdES baseline signatures". [4] ISO/IEC 21320-1: "Information technology -- Document Container File -- Part 1: Core".
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] OASIS "Test Assertions Guidelines Version 1.0", 19 June 2013. OASIS Committee Note 02. NOTE: Available at: http://docs.oasis-open.org/tag/guidelines/v1.0/cn02/guidelines-v1.0-cn02.html ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 6 [i.2] ETSI TR 119 164-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC) - Testing Conformance and Interoperability; Part 1: Overview". [i.3] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations".
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
3 Definitions and abbreviations
| |
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
3.1 Definitions
|
For the purposes of the present document, the terms and definitions given in ETSI TR 119 001 [i.3] and in the Test Assertions Guidelines [i.1] apply. In case of contrast the former prevails.
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
3.2 Abbreviations
|
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.3] and the following apply: CS Container Structure PKI Public Key Infrastructure SC Syntactical Conformance STV Signature Time-stamp token Value TA Test Assertion NOTE: Refer to [i.1]. TAL Test Assertion List NOTE: Refer to [i.1]. TC Test Case URI Uniform Resource Identifier 4 ASiC baseline container conformity test specification overview The present clause describes the main aspects of the technical approach used for specifying the whole set of checks to be performed for testing conformance to ASiC baseline containers [1]. ASiC [1] defines different containers forms grouped in Simple (ASiC-S) and Extended (ASiC-E). In order to test conformity against ASiC [1], for each ASiC form, tests are specified as belonging to one of three layers: • The first layer is based on test assertions on the conformance of the container structure: the presence of certain files in the container with specific names. Entities testing conformance can obtain specific information to identify potential container conformance problems. • The second layer is based on test assertions on the syntactical conformance and/or properties of files relevant to ASiC form under test: specific information to identify potential conformance issues related to ASiC file syntax or properties can be obtained. • The third layer is based on assertions on conformance of the CAdES or XAdES signatures contained in the specific ASiC form under test: specific information to identify potential conformance issues caused by lack of conformance in signatures contained in ASiC containers can be obtained. All layer tests shall be performed to complete testing. No tests are included testing the technical validity of the cryptographic material that might be present in the signature or to be used for its verification (status of certificates for instance). ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 7 The test definitions are based on test assertions work produced by OASIS in "Test Assertions Guidelines Version 1.0" [i.1]. Each test assertion includes the following information: 1) Unique identifier for further referencing. 2) Reference to the Normative source for the test. 3) The Target of the assertion. 4) The Prerequisite specifies the conditions under which the TA is applicable/can be performed 5) Predicate fully and unambiguously defining the assertion to be tested. 6) Prescription level: Three levels are defined: mandatory, recommended and optional, whose semantics is to be interpreted as described in clause 3.1.2 of [i.1]. 7) Tag: information on the element tested by the assertion.
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
5 Testing conformance to ASiC-S baseline containers
| |
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
5.1 Testing ASiC-S baseline containers
| |
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
5.1.1 Test assertions for ASiC-S baseline container structure
|
All the test assertions related to the first conformance layer, the container structure, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-S/CS List Description: all TAs describing container structure requirements for ASiC-S containers to the following Clauses in ASiC [1]: 5.3.1, 5.3.2.1, 5.3.2.2, 5.3.2.3 List Members: TA/ASiC-S/CS/1 ... 5 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/CS/1 Normative Source: ASiC [1] – Clause 5.3.1 Target: ASiC generator claiming conformance to ASiC-S baseline containers [1] Predicate: The container shall be compliant with ISO/IEC 21320-1 [6] Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/CS/2 Normative Source: ASiC [1] – Clause 5.3.2.1 Table 2 row 1 Target: ASiC generator claiming conformance to ASiC-S baseline containers [1] Predicate: ASiC File extension is “.asics”. Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/CS/3 Normative Source: ASiC [1] – Clause 5.3.2.1 Table 2 row 2 Target: ASiC generator claiming conformance to ASiC-S baseline containers [1] Predicate: mimetype is encoded as specified in ASiC [1] Clauses 4.3.3.1, point 2) b) and A.1 Prescription Level: optional Tag: conformance layer = 1 (container structure); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/CS/4 Normative Source: ASiC [1] – Clause 4.3.3.2 item 3 and either 4b or 4c Target: ASiC generator claiming conformance to ASiC-S baseline containers [1] Predicate: META-INF folder is present and contains one file named signature.p7s or signatures.xml. Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Simple (ASiC-S) ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 8 TA id: TA/ASiC-S/CS/5 Normative Source: ASiC [1] – Clause 5.3.2.1 Table 2 row 3 Target: ASiC generator claiming conformance to ASiC-S baseline containers [1] Predicate: a single data object, in addition to the optional mimetype, is present in the root folder. Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Simple (ASiC-S) 5.1.2 Test assertions for ASiC-S baseline container syntactical conformance All the test assertions related to the second conformance layer, the syntactical conformance, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-S/SC List Description: all TAs describing container structure requirements for ASiC-S containers to the following Clauses in ASiC [1]: 5.3.1, 5.3.2.1, 5.3.2.2, 5.3.2.3 List Members: TA/ASiC-S/SC/1 ... 4 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/SC/1 Normative Source: ASiC [1] – Clause 5.3.2.2 Table 3 Target: ASiC generator claiming conformance to ASiC-S with CAdES [1] Prerequisite: the expected input is ASiC-S with CAdES. Predicate: signature.p7s is present and contains a CAdES baseline signature whose conformance shall be tested according to Conformance Testing for CAdES baseline signatures specification [4], clause 5.2. Prescription Level: mandatory Tag: assertion layer = 2 (syntactical conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/SC/2 Normative Source: ASiC [1] – Clause 5.3.2.3 Table 4 Target: ASiC generator claiming conformance to ASiC-S with XAdES [1] Prerequisite: the expected input is ASiC-S XAdES. Predicate: signatures.xml is present and contains asic:XAdESSignatures Prescription Level: mandatory Tag: assertion layer = 2 (syntactical conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/SC/3 Normative Source: ASiC [1] – Clause 5.3.2.3 Table 4 Target: ASiC generator claiming conformance to ASiC-S with XAdES [1] Prerequisite: TA/ASiC-S/SC/2 passed. Predicate: signatures.xml contains a XAdES baseline signature whose conformance shall be tested according to Conformance Testing for XAdES core specification [5] clauses 5.2 and 5.3 Prescription Level: mandatory Tag: assertion layer = 2 (syntactical conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/SC/4 Normative Source: ASiC [1] – Clause 5.3.2.3 Table 4 Target: ASiC generator claiming conformance to ASiC-S with XAdES [1] Prerequisite: TA/ASiC-S/SC/3 passed. Predicate: Each XAdES signature child of the asic:XAdESSignatures element shall reference explicitly the signed file object using a ds:Reference child of the ds:SignedInfo element Prescription Level: mandatory Tag: assertion layer = 2 (syntactical conformance); Container type=Simple (ASiC-S)
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
5.1.3 Test assertions for ASiC-S signature conformance
|
All the test assertions related to the third conformance layer, the signature/time-stamp token conformance, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-S/STV List Description: all TAs describing signature conformance requirements for ASiC-S to the following clauses in ASiC [1]: 5.3.1, 5.3.2.1, 5.3.2.2, 5.3.2.3 List Members: TA/ASiC-S/STV/1 ... ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 9 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-S/STV/1 Normative Source: ASiC [1] – Clause 5.3.2.2 Table 3 Target: ASiC generator claiming conformance to ASiC-S with CAdES baseline container Prerequisite: TAL/ASiC-S/CS and TA/ASiC-S/SC/1 Predicate: the signatures in signature.p7s apply to the data object in TA/ASiC-S/CS/5 Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/2 Normative Source: ASiC [1] – Clause 5.3.2.3 Table 4 Target: ASiC generator claiming conformance to ASiC-S with XAdES baseline container Prerequisite: TAL/ASiC-S/CS, TA/ASiC-S/SC/2, TA/ASiC-S/SC/3 and TA/ASiC-S/SC/4 Predicate: XAdES signatures in signatures.xml apply to the data object in TA/ASiC-S/CS/5 Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/3 Normative Source: ASiC [1] – Clause 5.1 item a Target: ASiC generator claiming conformance to ASiC-S B-B level with CAdES Prerequisite: TA/ASiC-S/STV/1 Predicate: the signatures in signature.p7s are CAdES-B-B signatures whose conformance shall be tested according to Conformance Testing for CAdES baseline signatures specification [4] clause 5. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/4 Normative Source: ASiC [1] – Clause 5.1 item a Target: ASiC generator claiming conformance to ASiC-S B-B level with XAdES Prerequisite: TA/ASiC-S/STV/2 Predicate: the signatures in signatures.xml are XAdES-B-B signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 5. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/5 Normative Source: ASiC [1] – Clause 5.1 item b Target: ASiC generator claiming conformance to ASiC-S B-T level with CAdES Prerequisite: TA/ASiC-S/STV/1 Predicate: the signatures in signature.p7s are CAdES-B-T signatures whose conformance shall be tested according to Conformance Testing for CAdES baseline signatures specification [4] clause 6. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/6 Normative Source: ASiC [1] – Clause 5.1 item b Target: ASiC generator claiming conformance to ASiC-S B-T level with XAdES Prerequisite: TA/ASiC-S/STV/2 Predicate: the signatures in signatures.xml are XAdES-B-T signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 6. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/7 Normative Source: ASiC [1] – Clause 5.1 item c Target: ASiC generator claiming conformance to ASiC-S B-LT level with CAdES Prerequisite: TA/ASiC-S/STV/1 Predicate: the signatures in signature.p7s are CAdES-B-LT signatures whose conformance shall be tested according to Conformance Testing for CAdES baseline signatures specification [4] clause 7. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/8 Normative Source: ASiC [1] – Clause 5.1 item c Target: ASiC generator claiming conformance to ASiC-S B-LT level with XAdES Prerequisite: TA/ASiC-S/STV/2 Predicate: the signatures in signatures.xml are XAdES-B-LT signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 7. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 10 TA id: TA/ASiC-S/STV/9 Normative Source: ASiC [1] – Clause 5.1 item d Target: ASiC generator claiming conformance to ASiC-S B-LTA level with CAdES Prerequisite: TA/ASiC-S/STV/1 Predicate: the signatures in signature.p7s are CAdES-B-LTA signatures whose conformance shall be tested according to Conformance Testing for CAdES baseline signatures specification [4] clause 8. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S) TA id: TA/ASiC-S/STV/10 Normative Source: ASiC [1] – Clause 5.1 item d Target: ASiC generator claiming conformance to ASiC-S B-LTA level with XAdES Prerequisite: TA/ASiC-S/STV/2 Predicate: the signatures in signatures.xml are XAdES-B-LTA signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 8. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-S)
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
6 Testing conformance to ASiC-E baseline containers
| |
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
6.1 Testing ASiC-E baseline containers
| |
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
6.1.1 Test assertions for ASiC-E baseline container structure
|
All the test assertions related to the first conformance layer, the container structure, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-E/CS List Description: all TAs describing container structure requirements for ASiC-S containers to the following Clauses in ASiC [1]: 5.3.1, 5.3.3 List Members: TA/ASiC-S/CS/1 ... 6 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-E/CS/1 Normative Source: ASiC [1] – Clause 5.3.1 Target: ASiC generator claiming conformance to ASiC-E baseline containers [1] Predicate: The container shall be compliant with ISO/IEC 21320-1 [6] Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/CS/2 Normative Source: ASiC [1] – Clause 5.3.3 Table 5 row 1 Target: ASiC generator claiming conformance to ASiC-E baseline containers [1] Predicate: ASiC File extension is “.asice” Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/CS/3 Normative Source: ASiC [1] – Clause 5.3.3 Table 5 row 2 Target: ASiC generator claiming conformance to to ASiC-E baseline containers [1] Predicate: mimetype is encoded as specified in ASiC [1] Clauses 4.4.3.1, item 2) and A.1 Prescription Level: optional Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/CS/5 Normative Source: ASiC [1] – Clause 5.3.3 Table 5 row 4 Target: ASiC generator claiming conformance to ASiC-E with XAdES baseline containers [1] Prerequisite: TA/ASiC-E/CS/1 Predicate: META-INF folder is present and contains one or more data objects whose name contains the word “signatures” and has the extension “.xml” Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/CS/6 Normative Source: ASiC [1] – Clause 5.3.3 Table 5 row 6 Target: ASiC generator claiming conformance to ASiC-E with XAdES baseline containers [1] Prerequisite: TA/ASiC-E/CS/1 Predicate: META-INF folder is present and contains manifest.xml Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 11
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
6.1.2 ASiC-E test assertions for syntactical conformance
|
All the test assertions related to the second conformance layer, the syntactical conformance, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-E/SC List Description: all TAs describing container structure requirements for ASiC-S containers to the following Clauses in ASiC [1]: 5.3.1, 5.3.3 List Members: TA/ASiC-E/SC/1 ... 4 The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-E/SC/1 Normative Source: ASiC [1] – Clause 5.3.3 Table 5 row 5 Target: ASiC generator claiming conformance to ASiC-E with XAdES baseline containers [1] Prerequisite: TAL/ASiC-E/CS Predicate: one or more *signatures*.xml are present each containing asic:XAdESSignatures. Prescription Level: mandatory Tag: assertion layer = 2 (syntactical conformance); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/SC/2 Normative Source: ASiC [1] – Clause 5.3.3 Table 5 row 6 Target: ASiC generator claiming conformance to ASiC-E with XAdES baseline containers [1] Prerequisite: TAL/ASiC-E/CS Predicate: META-INF folder is present and contains a well formed manifest.xml, as defined in OASIS Open Document Format specifications Prescription Level: optional Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/SC/3 Normative Source: ASiC [1] – Clause 5.3.1 Target: ASiC generator claiming conformance to ASiC-E with XAdES baseline containers [1] Prerequisite: TAL/ASiC-E/CS, TA/ASiC-E/SC/1 Predicate: one or more signatures present in one or more signature files contain only XAdES baseline signature whose conformance shall be tested according to Conformance Testing for XAdES core specification [5] clauses 5.2 and 5.3 Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E) TA id: TA/ASiC-E/SC/4 Normative Source: ASiC [1] – Clause 5.3.3: Table 5 row 3 and 4; and additional requirement c) Target: ASiC generator claiming conformance to ASiC-E with XAdES baseline containers [1] Prerequisite: TAL/ASiC-E/CS, TA/ASiC-E/SC/3 Predicate: one or more signatures present in one or more signature files use the ds:Reference children of the ds:SignedInfo element to reference one or more signed file objects present in the container using relative URIs that are relative to the root folder Prescription Level: mandatory Tag: conformance layer = 1 (container structure); Container type=Extended (ASiC-E)
|
d7d2c3b956312128fa11de3e35504754
|
119 164-4
|
6.1.3 Test assertions for ASiC-E signature conformance
|
All the test assertions related to the third conformance layer, the signature/time-stamp token conformance, are grouped in a Test Assertion List defined as follows: TA List id: TAL/ASiC-E/STV List Description: all TAs describing signature conformance requirements for ASiC-E to the following clauses in ASiC [1]: 5.3.1, 5.3.3 List Members: TA/ASiC-E/STV/1 ... The Test Assertions that belong to this Test Assertion List are specified as follows: TA id: TA/ASiC-E/STV/1 Normative Source: ASiC [1] – Clause 6.2.2 item 2 Prerequisite: TAL/ASiC-E/CS, TAL/ASiC-E/SC Predicate: XAdES signatures in the signature files apply to the referenced data objects Prescription Level: mandatory Tag: assertion layer = 3 (signature/time-stamp token conformance); Container type=Extended (ASiC-E) ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 12 TA id: TA/ASiC-E/STV/2 Normative Source: ASiC [1] – Clause 5.1 item a Target: ASiC generator claiming conformance to ASiC-E B-B level with XAdES Prerequisite: TA/ASiC-E/STV/1 Predicate: the signatures in signatures.xml are XAdES-B-B signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 5. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-E) TA id: TA/ASiC-E/STV/3 Normative Source: ASiC [1] – Clause 5.1 item b Target: ASiC generator claiming conformance to ASiC-E B-T level with XAdES Prerequisite: TA/ASiC-E/STV/1 Predicate: the signatures in signatures.xml are XAdES-B-T signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 6. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-E) TA id: TA/ASiC-E/STV/4 Normative Source: ASiC [1] – Clause 5.1 item c Target: ASiC generator claiming conformance to ASiC-E B-LT level with XAdES Prerequisite: TA/ASiC-E/STV/1 Predicate: the signatures in signatures.xml are XAdES-B-LT signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 7. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-E) TA id: TA/ASiC-E/STV/5 Normative Source: ASiC [1] – Clause 5.1 item d Target: ASiC generator claiming conformance to ASiC-E B-LTA level with XAdES Prerequisite: TA/ASiC-E/STV/1 Predicate: the signatures in signatures.xml are XAdES-B-LTA signatures whose conformance shall be tested according to Conformance Testing for XAdES baseline signatures specification [5] clause 8. Prescription Level: mandatory Tag: assertion layer = 3 (signature conformance); Container type=Simple (ASiC-E) ETSI ETSI TS 119 164-4 V1.1.1 (2016-06) 13 History Document history V1.1.1 June 2016 Publication
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
1 Scope
|
The present document defines the checks to be performed for testing conformance of CAdES signatures against extended CAdES signatures as specified in ETSI EN 319 122-2 [2]. It defines only the checks that are specific to extended CAdES signatures. The set of checks that are common to both extended and baseline CAdES signatures, are defined in ETSI TS 119 124-4 [3]. The complete set of checks to be performed by any tool on CAdES extended signatures is the union of the sets defined within the present document and the set of common checks for testing conformance against ETSI EN 319 122-1 [1] and ETSI EN 319 122-2 [2] defined in ETSI TS 119 124-4 [3], as indicated in the normative clauses of the present document. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence, no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. Checks specified by the present document are exclusively constrained to elements specified by CAdES [1]. Regarding CAdES attributes, the present document explicitly differentiates between structural requirements that are defined on building blocks, and the requirements specified for extended CAdES signatures conformance. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by CAdES [1].
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
2 References
| |
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https://docbox.etsi.org/Reference/. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures". [2] ETSI EN 319 122-2: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 2: Extended CAdES signatures". [3] ETSI TS 119 124-4: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 4: Testing conformance of CAdES baseline signatures". ETSI ETSI TS 119 124-5 V1.1.1 (2016-06) 6
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI TR 119 124-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 1: Overview". [i.2] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations". [i.3] OASIS Committee Notes: "Test Assertions Guidelines Version 1.0" Committee Note 02, 19 June 2013.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
3 Definitions and abbreviations
| |
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
3.1 Definitions
|
For the purposes of the present document, the terms and definitions given in ETSI TR 119 001 [i.2] apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
3.2 Abbreviations
|
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.2] apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
4 Overview
|
The present clause describes the main aspects of the technical approach used for specifying the set of checks to be performed for testing conformance to ETSI EN 319 122-2 [2]. ETSI EN 319 122-1 [1] defines requirements for building blocks and CAdES baseline signatures. For the purpose of identifying the whole set of test assertions required for testing conformance against extended CAdES signatures as specified in ETSI EN 319 122-2 [2], the present document classifies the whole set of requirements specified in ETSI EN 319 122-1 [1] and in ETSI EN 319 122-2 [2] in two groups as follows: 1) Requirements "CAdES_BB" (after "CAdES building blocks"): requirements defined in clauses 4, 5, and annex A of ETSI EN 319 122-1 [1] that have to be satisfied by both CAdES baseline signatures as specified in ETSI EN 319 122-1 [1] and extended CAdES signatures as specified in ETSI EN 319 122-2 [2]. The checks for these requirements are defined in ETSI TS 119 124-4 [3]. When needed in the present document, such checks are referred by their TA_id. 2) Requirements "CAdES_ES" (after "Extended CAdES signatures"): requirements defined in clauses 5 and 6 of ETSI EN 319 122-2 [2]. These are requirements specific to extended CAdES signatures. a) In order to test conformance to ETSI EN 319 122-2 [2], several types of tests are identified, namely: 1) Tests on the signature structure. 2) Tests on values of specific elements and/or attributes. 3) Tests on interrelationship between different elements present in the signature. ETSI ETSI TS 119 124-5 V1.1.1 (2016-06) 7 4) Tests on computations reflected in the contents of the signatures (message imprints for a time-stamping service, computed by digesting the concatenation of a number of elements of the signature, for instance). b) No tests are included testing actual validity of the cryptographic material that might be present at the signature or to be used for its verification (status of certificates for instance). c) Tests are defined as test assertions following the work produced by OASIS in "Test Assertions Guidelines Version 1.0" [i.3]. Each test assertion includes: 1) Unique identifier for further referencing. The identifiers of the assertions defined within the present document start with "CAdES_ES", after "Extended CAdES signatures". 2) Reference to the Normative source for the test. 3) The Target of the assertion. In the normative part, this field identifies one of the format specified in Extended CAdES signatures specification [2]. 4) Prerequisite (optional) is, according to [i.3], "a logical expression (similar to a Predicate) which further qualifies the Target for undergoing the core test (expressed by the Predicate) that addresses the Normative Statement". It is used for building test assertions corresponding to requirements that are imposed under certain conditions. 5) Predicate fully and unambiguously defining the assertion to be tested. 6) Prescription level: Three levels are defined: mandatory, recommended and permitted, whose semantics is to be interpreted as described in clause 3.1.2 of [i.3]. 7) Tag: information on the element tested by the assertion. The presentation of the checks are organized following the formats of extended CAdES signatures specified in [2]. The following signature levels are considered: • CAdES-E-BES. • CAdES-E-EPES. • CAdES-E-T. • CAdES-E-A. 5 Testing conformance to CAdES-E-BES extended signatures
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.1 Introduction
|
This clause specifies the set of assertions to be tested on signatures claiming conformance to the CAdES-E-BES signatures level as specified by ETSI EN 319 122-2 [2]. The next clauses specify the assertions for testing whether the elements that are profiled by ETSI EN 319 122-2 [2], are actually conformant to this level. The constraints imposed by the extended CAdES signatures specification [2] to the CMS Signature elements are tested.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.2 Testing CMSversion
|
This clause defines the test assertions for SignedData.CMSversion attribute presence in CMS signature. The CAdES_BB/CMSV check in ETSI TS 119 124-4 [3] shall apply. ETSI ETSI TS 119 124-5 V1.1.1 (2016-06) 8
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.3 Testing DigestAlgorithmIdentifiers
|
This clause defines the test assertions for SignedData.DigestAlgorithmIdentifiers attribute presence in CMS signature. The CAdES_BB/DAI check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.4 Testing EncapsulatedContentInfo
|
This clause defines the test assertions for SignedData.EncapsulatedContentInfo attribute presence in CMS signature. The CAdES_BB/ECI check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.5 Testing SignedData.certificates
|
This clause defines the test assertions for SignedData.certificates attribute presence in CMS signature. The CAdES_BB/SDC/1 and 2 checks in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.6 Testing SignedData.crls
|
This clause defines the test assertions for SignedData.crls attribute. The CAdES_BB/SDCRL/1, 2 and 3 checks in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.7 Testing SignerInfos
|
This clause defines the test assertions for SignedData.SignerInfos attribute presence in CMS signature. The CAdES_BB/SI/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.8 Testing content-type
|
This clause defines the test assertions for ContentType attribute presence in CMS signature. The CAdES_BB/CTY/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.9 Testing message-digest
|
This clause defines the test assertion for message-digest attribute presence in CMS signature. The CAdES_BB/MD/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.10 Testing signing-time
|
This clause defines the test assertions for SigningTime attribute presence in CMS signature. TA id: CAdES_ES/STI/1 Normative source: [2] - Clause 4.3 Target: CAdES signature generator claiming conformance to CAdES-E-BES signatures format as specified in [2] Predicate: For new signatures, applications include SigningTime attribute in CAdES signature. Prescription level: permitted Tag: CAdES-E-BES signatures. The CAdES_BB/STI/1 check in ETSI TS 119 124-4 [3] shall apply. ETSI ETSI TS 119 124-5 V1.1.1 (2016-06) 9
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.11 Testing Enhanced Security Services (ESS)
|
This clause defines the test assertions for ESS attribute presence in CMS signature. The CAdES_BB/ESS/1, 2, 3 and 4 checks in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.12 Testing commitment-type-indication
|
This clause defines the test assertion for commitment-type-indication attribute presence in CMS signature. The CAdES_BB/CTI/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.13 Testing signer-location
|
This clause defines the test assertion for signer-location attribute presence in CMS signature. The CAdES_BB/SL/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.14 Testing signer-attributes-v2
|
This clause defines the test assertion for signer-attributes attribute presence in CMS signature. The CAdES_BB/SA/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.15 Testing counter-signature
|
This clause defines the test assertion for counter-signature attribute presence in CMS signature. The CAdES_BB/CS/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.16 Testing content-time-stamp
|
This clause defines the test assertion for content-time-stamp attribute presence in CMS signature. The CAdES_BB/CTS/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.17 Testing content-reference
|
This clause defines the test assertion for content-reference attribute presence in CMS signature. The CAdES_BB/CR/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.18 Testing content-identifier
|
This clause defines the test assertion for content-identifier attribute presence in CMS signature. The CAdES_BB/CI/1 check in ETSI TS 119 124-4 [3] shall apply.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.19 Testing content-hints
|
This clause defines the test assertion for content-hints attribute presence in CMS signature. The CAdES_BB/CH/1 check in ETSI TS 119 124-4 [3] shall apply. ETSI ETSI TS 119 124-5 V1.1.1 (2016-06) 10
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
5.20 Testing mime-type
|
This clause defines the test assertion for mime-type attribute presence in CMS signature. The CAdES_BB/MT/1 check in ETSI TS 119 124-4 [3] shall apply. 6 Testing conformance to CAdES-E-EPES extended signatures
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
6.1 Introduction
|
The present clause specifies the set of assertions to be tested on signatures claiming conformance to the CAdES-E-EPES signatures level as specified by ETSI EN 319 122-2 [2]. CAdES-E-EPES signatures are built on CAdES-E-BES signatures. In consequence, CAdES-E-EPES signatures shall fulfill the requirements specified in clause 5 of the present document and all the requirements defined in clauses 6.2 and 6.3.
|
77fca53da8facd3195154cd5f20630ff
|
119 124-5
|
6.2 Testing signature-policy-identifier
|
This clause defines the test assertion for signature-policy-identifier attribute presence in CMS signature. TA id: CAdES_ES/SPID/1 Normative source: [2] - Clause 4.3 Target: CAdES signature generator claiming conformance to CAdES-E-EPES signatures format as specified in [2] Predicate: For new signatures, applications include signature-policy-identifier attribute in CAdES signature. Prescription level: mandatory Tag: CAdES-E-EPES signatures.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.