Security Service Avatar
  1. OMG Specification

Security Service — Open Issues

  • Acronym: SEC
  • Issues Count: 14
  • Description: Issues not resolved
Open Closed All
Issues not resolved

Issues Descriptions

Current:get_policy() is semanitically insconsitent with curr. object mode

  • Key: SEC14-15
  • Legacy Issue Number: 1787
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: The model currently specifies that _set_policy_overrides(), and
    get_policy() apply to the particular object reference.

    That would mean that the policies applied to accessing Current.
    I suggest that we aliviate this discrepancy by putting a
    CORBA::PolicyManager get_policy_manager() on the Current interface.
    The PolicyManager is currently part of the new Async Messaging Specification
    and would be a good interface to do this with.

  • Reported: SEC 1.3 — Mon, 10 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Using SecurityOpaque causes needless buffer copying

  • Key: SEC14-14
  • Legacy Issue Number: 1786
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Using SecurityOpaque causes needless buffer copying. I suggest
    a buffer interface.
    Using a sequence<octet> for tokens going in and out of
    SecurityReplaceable::Vault and SecurityContext imply
    (at least in the Java) maps it to an array of fixed length.

    This causes the implementations to constantly recopy entire
    arrays just to get the length attribute set correctly.

  • Reported: SEC 1.3 — Fri, 7 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

SecurityFeatures still confusing!

  • Key: SEC14-13
  • Legacy Issue Number: 1768
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Okay, I"ll give you there is a need for security features
    provided they are only looked at for supported features of
    credentials and contexts. Not for setting.
    These should be done via setting assoication options and setting the
    delegation mode;

    To simplfy the semantics of SecurityFeatures and using them,
    the spec should specify a good programing model. Otherwise,
    examining them and manipulating them becomes ineffcient.

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Credentials and PrincipalAuthenticator should be in SecurityReplaceable

  • Key: SEC14-12
  • Legacy Issue Number: 1767
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: As I lamented before. I fear that to make much implemenation
    sense out of the "replaceability of the module I believe
    SecurityReplaceable should have Credentials and PrincipalAuthenticator
    as well.

    Note: This does not proclude security level 2 from having
    Credentials and PrincpalAuthenticator, just that SecurityReplaceable
    should have them as well.
    .

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Credentials not in SecurityReplaceable.

  • Key: SEC14-11
  • Legacy Issue Number: 1766
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: It would appear since the SecurityContext must hold onto the
    Credentials object, that the Credentials object must appear
    in SecurityReplaceable as well, since there is no factory
    for generation of credentials in an independant way.

    Perhaps a "Server Context should have a list of
    security attributes instead of a list of credentials.
    That way an orb using a replacable module can create a local
    credentials object and put the security attributes in it.

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Security Context does not reveal client/server orientation.

  • Key: SEC14-10
  • Legacy Issue Number: 1764
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary:

    Each security context, at least at the SECIOP/GIOP levels each
    have a client and target orientation. This is not reflected
    in the SecurityContext interface.

    Also, using the same context for both, is misleading, in the
    sense that "received_credentials" does not make sense for
    a context on the client side:

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Credentials issue

  • Key: SEC14-9
  • Legacy Issue Number: 1763
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Credentials do not have a mechanism specification, a delegation mode,
    specification, and an origin specification.

    I believe the credentials object may be used to hold the means
    necessary to support a security mechansim. It would be much less
    confusing, and easier to specify, if there is one credentials
    object per mechanism.

    We should state that one credential object supports one
    mechanism type.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

DelegationDirectivePolicy Needed

  • Key: SEC14-8
  • Legacy Issue Number: 1761
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: We need a delegation directive policy in order to convey on an
    object reference, and elsewhere, that whether the credentials
    beign used are to be delegated or not.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Semantics of the Mechanism Policy is not defined wel

  • Key: SEC14-3
  • Legacy Issue Number: 1756
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Semantics of the Mechanism Policy is not defined well.
    There are different semantics if it is applied to a
    client object reference than to a server object reference.

    On the server side, the mechanism list stipulates which
    mechanisms can be used to handle the requests. This may
    stipulate which mechanisms are advertised in the IOR.

    However, since there is an order, and order preference should
    be specified. If a client wishes to invoke on said object and
    two mechanisms support the requested features, the first one
    that does so in the IOR should be said to be selected.

    To support multiple mechanisms on the client side, one would
    have to inquire which one was used and in which order to
    use them. This can also be implied by the order of the list.

    However, the semantics of such should be specified.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Inconsistent Spelling between Security and SecurityLevel2

  • Key: SEC14-5
  • Legacy Issue Number: 1758
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Inconsistent Spelling between Security and SecurityLevel2

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Operations regarding Security Features

  • Key: SEC14-4
  • Legacy Issue Number: 1757
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Operations regarding Security Features are too vague, unclear,
    can be inconsistent, and most likely, not fully implementable.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Duplicate DelegationMode(s) in Security and SecurityLevel2

  • Key: SEC14-7
  • Legacy Issue Number: 1760
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Duplicate DelegationMode(s) in Security and SecurityLevel2

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Misspelling

  • Key: SEC14-6
  • Legacy Issue Number: 1759
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: const EventType AuditObectjCreation = 7;

    should be

    const EventType AuditObjectCreation = 7;

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Typo in 98-01-02

  • Key: SEC14-2
  • Legacy Issue Number: 1404
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: I believe there is a typo in 98-01-02 p.15-277. The line
    const AssociationOptions DetectReply = 8;
    should read:
    const AssociationOptions DetectReplay = 8;

  • Reported: SEC 1.3 — Mon, 1 Jun 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT