Security Service Avatar
  1. OMG Specification

Security Service — All Issues

  • Acronym: SEC
  • Issues Count: 20
  • Description: All Issues
Open Closed All
All Issues

Issues Descriptions

Credentails.set_privileges()

  • Key: SEC14-55
  • Legacy Issue Number: 1765
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: The documentation states that the force_commit parameter given the value
    of false will cause the privileges to be set at a later time. If so,
    what does the out parameter "actual_privileges" return?
    Is this valid only if force_commit was true and successful?

    Also, boolean states a return value. I believe this should be
    void, and state that exceptions will be raised with reasons for
    failure.

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Disposition: Resolved — SEC 1.4
  • Disposition Summary:

    Close Issue 1765: set_privileges

  • Updated: Fri, 6 Mar 2015 20:58 GMT

SecIOP Architecture

  • Key: SEC14-54
  • Legacy Issue Number: 1723
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: In trying to understand some problems we"re having on
    our reference implementation development, I"ve run
    across an inconsistency in the CORBAsec V1.2 spec.

    On page 15-191, Section, 15.9.1, there is a figure
    15-59 that shows the SECIOP protocol underneath the
    IIOP protocol. This is contrary to my understanding
    of the SECIOP architecture, which corresponds to
    Figure 15-57 - where the SECIOP protocol is located
    between the GIOP and IIOP protocols.

    Hopefully, the problem is simply that Figure 15-59
    should have "IIOP" replaced by "GIOP".

  • Reported: SEC 1.3 — Wed, 22 Jul 1998 04:00 GMT
  • Disposition: Resolved — SEC 1.4
  • Disposition Summary:

    Close issue 1723: SecIOP Architecture

  • Updated: Fri, 6 Mar 2015 20:58 GMT

DelegationMode

  • Key: SEC14-57
  • Legacy Issue Number: 1930
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: enum DelegationMode is defined in Security.idl and in SecurityLevel2.idl.
    Both definitions are rather different:

  • Reported: SEC 1.3 — Wed, 2 Sep 1998 04:00 GMT
  • Disposition: Resolved — SEC 1.4
  • Disposition Summary:
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Principal Authenticator

  • Key: SEC14-56
  • Legacy Issue Number: 1847
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: Security 1.3 Service pages 15-87 5 Jan 1998

    continue_authentication has the wrong in/out designations on
    three of its four parameters. I have in, in, out, out.

    It shoud be

    continue_authentication(
    in Opapue response_data,
    inout Credentials creds,
    inout Opaque continuation_data,
    inout Opaque auth_specific_data
    );

  • Reported: SEC 1.3 — Fri, 21 Aug 1998 04:00 GMT
  • Disposition: Resolved — SEC 1.4
  • Disposition Summary:

    No Data Available

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Extension to SecurityContext to support SECIOP::DiscardContext

  • Key: SEC14-53
  • Legacy Issue Number: 1661
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: I believe the SecurityContext interface needs to be extended to properly
    support the SECIOP::DiscardContext message.

  • Reported: SEC 1.3 — Fri, 10 Jul 1998 04:00 GMT
  • Disposition: Resolved — SEC 1.4
  • Disposition Summary:

    :DiscardContext message.

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Paragraph 19, section 15.8.4.2

  • Key: SEC14-52
  • Legacy Issue Number: 1633
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: Paragraph 19 of section 15.8.4.2 says:

    "In this example if mechanism “mech 1” is used the target security name is “MBn1”
    while the association must use integrity replay and misordering options. If mechanism
    “mech 2” is used no mechanism specific security name has been specified and so
    “Manchester branch” is used as the security name. The association options are
    EstablishTrustInClient and Integrity."

    The last sentence seems to imply that if "mech 2" is used the top-level
    association options, and not the association options for "mech 2" are used.
    If this is always the case, then it would seem pointless to bother
    specifying association options for "mech 2" because they will never be
    used. If this is the case (which would also be very strange) only when
    a tag_sec_name is not present for "mech 2" this should be explained
    more clearly.

  • Reported: SEC 1.3 — Thu, 2 Jul 1998 04:00 GMT
  • Disposition: Resolved — SEC 1.4
  • Disposition Summary:

    Close issue 1633: Paragraph 19, section 15.8.4.2

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Current:get_policy() is semanitically insconsitent with curr. object mode

  • Key: SEC14-15
  • Legacy Issue Number: 1787
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: The model currently specifies that _set_policy_overrides(), and
    get_policy() apply to the particular object reference.

    That would mean that the policies applied to accessing Current.
    I suggest that we aliviate this discrepancy by putting a
    CORBA::PolicyManager get_policy_manager() on the Current interface.
    The PolicyManager is currently part of the new Async Messaging Specification
    and would be a good interface to do this with.

  • Reported: SEC 1.3 — Mon, 10 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Using SecurityOpaque causes needless buffer copying

  • Key: SEC14-14
  • Legacy Issue Number: 1786
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Using SecurityOpaque causes needless buffer copying. I suggest
    a buffer interface.
    Using a sequence<octet> for tokens going in and out of
    SecurityReplaceable::Vault and SecurityContext imply
    (at least in the Java) maps it to an array of fixed length.

    This causes the implementations to constantly recopy entire
    arrays just to get the length attribute set correctly.

  • Reported: SEC 1.3 — Fri, 7 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

SecurityFeatures still confusing!

  • Key: SEC14-13
  • Legacy Issue Number: 1768
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Okay, I"ll give you there is a need for security features
    provided they are only looked at for supported features of
    credentials and contexts. Not for setting.
    These should be done via setting assoication options and setting the
    delegation mode;

    To simplfy the semantics of SecurityFeatures and using them,
    the spec should specify a good programing model. Otherwise,
    examining them and manipulating them becomes ineffcient.

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Credentials and PrincipalAuthenticator should be in SecurityReplaceable

  • Key: SEC14-12
  • Legacy Issue Number: 1767
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: As I lamented before. I fear that to make much implemenation
    sense out of the "replaceability of the module I believe
    SecurityReplaceable should have Credentials and PrincipalAuthenticator
    as well.

    Note: This does not proclude security level 2 from having
    Credentials and PrincpalAuthenticator, just that SecurityReplaceable
    should have them as well.
    .

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Credentials not in SecurityReplaceable.

  • Key: SEC14-11
  • Legacy Issue Number: 1766
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: It would appear since the SecurityContext must hold onto the
    Credentials object, that the Credentials object must appear
    in SecurityReplaceable as well, since there is no factory
    for generation of credentials in an independant way.

    Perhaps a "Server Context should have a list of
    security attributes instead of a list of credentials.
    That way an orb using a replacable module can create a local
    credentials object and put the security attributes in it.

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Security Context does not reveal client/server orientation.

  • Key: SEC14-10
  • Legacy Issue Number: 1764
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary:

    Each security context, at least at the SECIOP/GIOP levels each
    have a client and target orientation. This is not reflected
    in the SecurityContext interface.

    Also, using the same context for both, is misleading, in the
    sense that "received_credentials" does not make sense for
    a context on the client side:

  • Reported: SEC 1.3 — Sun, 2 Aug 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Credentials issue

  • Key: SEC14-9
  • Legacy Issue Number: 1763
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Credentials do not have a mechanism specification, a delegation mode,
    specification, and an origin specification.

    I believe the credentials object may be used to hold the means
    necessary to support a security mechansim. It would be much less
    confusing, and easier to specify, if there is one credentials
    object per mechanism.

    We should state that one credential object supports one
    mechanism type.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

DelegationDirectivePolicy Needed

  • Key: SEC14-8
  • Legacy Issue Number: 1761
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: We need a delegation directive policy in order to convey on an
    object reference, and elsewhere, that whether the credentials
    beign used are to be delegated or not.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Semantics of the Mechanism Policy is not defined wel

  • Key: SEC14-3
  • Legacy Issue Number: 1756
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Semantics of the Mechanism Policy is not defined well.
    There are different semantics if it is applied to a
    client object reference than to a server object reference.

    On the server side, the mechanism list stipulates which
    mechanisms can be used to handle the requests. This may
    stipulate which mechanisms are advertised in the IOR.

    However, since there is an order, and order preference should
    be specified. If a client wishes to invoke on said object and
    two mechanisms support the requested features, the first one
    that does so in the IOR should be said to be selected.

    To support multiple mechanisms on the client side, one would
    have to inquire which one was used and in which order to
    use them. This can also be implied by the order of the list.

    However, the semantics of such should be specified.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Inconsistent Spelling between Security and SecurityLevel2

  • Key: SEC14-5
  • Legacy Issue Number: 1758
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Inconsistent Spelling between Security and SecurityLevel2

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Operations regarding Security Features

  • Key: SEC14-4
  • Legacy Issue Number: 1757
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Operations regarding Security Features are too vague, unclear,
    can be inconsistent, and most likely, not fully implementable.

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Duplicate DelegationMode(s) in Security and SecurityLevel2

  • Key: SEC14-7
  • Legacy Issue Number: 1760
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: Duplicate DelegationMode(s) in Security and SecurityLevel2

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Misspelling

  • Key: SEC14-6
  • Legacy Issue Number: 1759
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: const EventType AuditObectjCreation = 7;

    should be

    const EventType AuditObjectCreation = 7;

  • Reported: SEC 1.3 — Thu, 30 Jul 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT

Typo in 98-01-02

  • Key: SEC14-2
  • Legacy Issue Number: 1404
  • Status: open  
  • Source: Anonymous
  • Summary:

    Summary: I believe there is a typo in 98-01-02 p.15-277. The line
    const AssociationOptions DetectReply = 8;
    should read:
    const AssociationOptions DetectReplay = 8;

  • Reported: SEC 1.3 — Mon, 1 Jun 1998 04:00 GMT
  • Updated: Fri, 6 Mar 2015 20:58 GMT