Security Service Avatar
  1. OMG Specification

Security Service — Closed Issues

  • Acronym: SEC
  • Issues Count: 8
  • Description: Issues resolved by a task force and approved by Board
Closed All
Issues resolved by a task force and approved by Board

Issues Descriptions

SSL/CORBA-How does client choose to use SSL?

  • Key: SEC16-8
  • Legacy Issue Number: 714
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: What criteria does does client use when choosing to use SSL?Was intent for AssociationOption, target_requires to be only determining factor for client decision to use SSL?

  • Reported: SEC 1.1 — Wed, 27 Aug 1997 04:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 714: SSL/CORBA-How does client chose to use SSL

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Need to get Received Credentials from the Server

  • Key: SEC16-5
  • Legacy Issue Number: 2440
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: Currently there is now way to examine the credentials of a server.
    We would like this capability in order to examine the fact that
    we have authenticated who we expected to contact.

  • Reported: SEC 1.5 — Fri, 5 Feb 1999 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2440 "Need to get Received Credentials from the Server"

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Security: SECIOP

  • Key: SEC16-4
  • Legacy Issue Number: 2437
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: Severity: Yes
    Security 1.5:
    Issue: Interoperability. SECIOP needs an internet address designation.

    The current specification says that SECIOP goes under GIOP and over IIOP.
    This is misguided, as IIOP is really just a term for GIOP over TCP/IP.

    SECIOP doesn"t really have to be over TCP/IP, but it might be helpful
    to think of it that way. However, like SSL, we need away to separate
    SECIOP over TCP/IP and GIOP over TCP/IP. If SECIOP cannot have it"s own
    profile, since now ONE profile can represent multiple protocols, then we
    need a way specify a different internet address (different port), but also
    maybe a different interface card (multihomed hosts).

  • Reported: SEC 1.5 — Thu, 4 Feb 1999 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2437 "SECIOP needs an internet address designation"

  • Updated: Fri, 6 Mar 2015 20:58 GMT

More nil/NULL arguments that need to be removed

  • Key: SEC16-3
  • Legacy Issue Number: 2344
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: As we realized during the RTF 1.5, we have erroneous text for
    operations that describe passing nil/NULL for parameters. I"ve
    tracked down a few more:

    p. 15-96 [495]: For the requested_privileges parameter, the phrase "(A
    null attribute set requests default attributes.)" should read "A
    zero length attribute list requests the default attributes."

    p. 15-130 [666]: For the data_included_in_token parameter, the phrase
    "(may be null)" should read "(may be a zero length sequence)".

    p. 15-156 [784]: The object_type (which is a repository id) parameter
    is allowed to be nil. It should read "If this is the empty string,
    all types are implied."

    p. 15-157 [787]: Same as above.

    p. 15-171 [846]: For the mechanism parameter, the phrase "Normally
    NULL" should read "Normally the empty string".

    p. 15-171 [846]: For the chain_bindings parameter, the phrase
    "Normally NULL (zero length)" should read "Normally a zero length
    octet sequence".

  • Reported: SEC 1.5 — Mon, 25 Jan 1999 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2344: More nil/NULL argument that need to be removed:

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Inappropriate examples of Integrity Violations

  • Key: SEC16-7
  • Legacy Issue Number: 2452
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: In ptc/98-12-03 on page 355 paragraph 1689 (second bullet), the
    examples given for Integrity Violations include trapdoors and
    viruses; however, just below that in paragraph 1691, "Inclusion
    of rogue code in the system, which gives access to sensitive
    information" is explicitly identified as being outside of the
    scope of the specification. Since both trapdoors and viruses
    are examples of rogue code, these two paragraphs contradict
    each other.

  • Reported: SEC 1.5 — Fri, 12 Feb 1999 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2452 "Need OID’s exposed in Vault."

  • Updated: Fri, 6 Mar 2015 20:58 GMT

Channel Bindings are underspecified

  • Key: SEC16-6
  • Legacy Issue Number: 2451
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: The channel bindings are described for operations, init_security_context,
    and accept_security_context in SecurityReplaceable::Vault, as
    Security::Opaque with no specification of what this looks like.

    This is a severe problem with the "Replaceability" of vaults, as SecIOP
    would like to place the channel bindings to any security context.

    Since the Vault, and SecurityContext were modeled after the GSS, I suggest
    that we adopt the GSS channel binding structure.

  • Reported: SEC 1.5 — Fri, 12 Feb 1999 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2451 "Channel Bindings are underspecified"

  • Updated: Fri, 6 Mar 2015 20:58 GMT

accept_security_contect() creds parameter

  • Key: SEC16-2
  • Legacy Issue Number: 2260
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: Should Vault::accept_security_context() take a CredentialsList parameter
    or a Credentials (not a list) like every other operations in Vault?

  • Reported: SEC 1.5 — Wed, 16 Dec 1998 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2260: accept_security_context() creds parameter

  • Updated: Fri, 6 Mar 2015 20:58 GMT

del parameter of set_delegation should be Security::DelegationDirective

  • Key: SEC16-1
  • Legacy Issue Number: 2259
  • Status: closed  
  • Source: Anonymous
  • Summary:

    Summary: t is possible that in
    the final resolutions document we forgot to say that the type of the
    "del" parameter of set_delegation should be
    Security::DelegationDirective and not SecurityLevel2::DelegationMode.
    This change was not specified either for the IDL or for the description
    of the set_credentials operation. Also DelegationMode should be removed from SecurityLevel2.

  • Reported: SEC 1.5 — Wed, 16 Dec 1998 05:00 GMT
  • Disposition: Resolved — SEC 1.6
  • Disposition Summary:

    Close issue 2259: del parameter .....

  • Updated: Fri, 6 Mar 2015 20:58 GMT