<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Philipp+Potisk</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Philipp+Potisk"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Philipp_Potisk"/>
		<updated>2026-05-15T09:56:27Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project_-_Assessment_Frame&amp;diff=55447</id>
		<title>Category:OWASP OpenSign Server Project - Assessment Frame</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project_-_Assessment_Frame&amp;diff=55447"/>
				<updated>2009-02-25T09:21:18Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP OpenSign Server Project|Click here to return to project's main page]].&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS - OWASP Summer of Code 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;[[User:Philipp Potisk|'''Philipp Potisk''']]&amp;lt;br&amp;gt;[mailto:techierebel@yahoo.co.uk Richard Conway] &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;[[:User:Pparrend|'''Pierre Parrend''']]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;[[:User:Gary.m.burns|'''Gary Burns''']]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;Non applicable&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|First Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|Second Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Beta Quality'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|Self-Evaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Beta Quality'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|First Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Beta Quality'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|Second Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=55446</id>
		<title>Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=55446"/>
				<updated>2009-02-25T09:19:17Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the certificate sign requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 80% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
none&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Be run through Fortify Software's open source review (if appropriate) and FindBugs&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55445</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55445"/>
				<updated>2009-02-25T09:15:27Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Code Signing and Verification */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. To start the client enter following command:&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by calling a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate file and verifies it. Additionally, the application downloads and verifies the certificate chain. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Steps for setting up the X.509 Hierarchy==&lt;br /&gt;
'''1.	Update the root-account'''  &lt;br /&gt;
&lt;br /&gt;
By starting the server the first time the root account is created and a private key plus corresponding certificate are generated. This account serves as admin-account for the server and as root-node of the X.509 Hierarchy. &lt;br /&gt;
It is necessary to reset the password, which can by done by loging in using the username: &amp;quot;root&amp;quot; and the password &amp;quot;123&amp;quot; and by navigating to &amp;quot;MySettings&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''2.	Creating an own issuer-account'''&lt;br /&gt;
&lt;br /&gt;
As it is recommended not to use the root-account for all the issuing procedures it is necessary to set up an account which is a sub-node from the root-account. This account is further on used to maintain a set of end-users. &lt;br /&gt;
In the first step the person, responsible for the issuer-account, has to register. In the second step, the owner of the root-account will need to log in and approve this request and grant this user issuer privileges. Once these settings are stored, the OpenSign server will generate a certificate for the issuer, which is publicly available on the issuers profile.&lt;br /&gt;
&lt;br /&gt;
Registering the issuer-account:&lt;br /&gt;
[[Image:Open_sign_server_reg.jpg]]&lt;br /&gt;
&lt;br /&gt;
Enabling the issuer-account by the root user:&lt;br /&gt;
[[Image:Open_sign_server_approve_issuer.jpg]]&lt;br /&gt;
&lt;br /&gt;
3.	End user registration&lt;br /&gt;
&lt;br /&gt;
Users may register and select the previously generated issuer-account (“owasp”) as their desired issuer. However, before they can use their account the issuer has to approve them first.&lt;br /&gt;
&lt;br /&gt;
Registration of an end-user: [[Image:Open_sign_server_reg_user.jpg]]&lt;br /&gt;
&lt;br /&gt;
4.	Certificate issuance&lt;br /&gt;
&lt;br /&gt;
It is possible to obtain a certificate by issuing a certificate sign request by use of the web-interface or by use of the client application. The form online can be found at: localhost:8080/csr. The processing of a certificate sign request with the client application is described above (command: csr).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Code Signing and Verification==&lt;br /&gt;
&lt;br /&gt;
This section describes the steps required for code-signing and verification supported by the OpenSign infrastructure.&lt;br /&gt;
&lt;br /&gt;
'''Signing'''&lt;br /&gt;
&lt;br /&gt;
1. Local generation of the private code-signing key. The key should be stored in a password-protected keystore.&lt;br /&gt;
&lt;br /&gt;
2. Generation of a certificate sign request (CSR)&lt;br /&gt;
&lt;br /&gt;
3. Processing the CSR by making use of the web-interface or the client application. Either way a certificate is returned on success. Furthermore, a copy of the certificate is stored within the server-infrastructure.&lt;br /&gt;
&lt;br /&gt;
4.Signing the code module by making use of the previously generated key.&lt;br /&gt;
&lt;br /&gt;
'''Verification'''&lt;br /&gt;
&lt;br /&gt;
1. Downloading the certificate by browsing the OpenSign X.509 hierarchy online or by use of the client application, which is the recommended option.&lt;br /&gt;
&lt;br /&gt;
2. Importing the certificate as a trusted certificate in the local key-store.&lt;br /&gt;
&lt;br /&gt;
3. Verifying the signed code module by use of the public key embedded in the downloaded certificate.&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55444</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55444"/>
				<updated>2009-02-25T09:14:49Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Code Signing and Verification */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. To start the client enter following command:&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by calling a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate file and verifies it. Additionally, the application downloads and verifies the certificate chain. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Steps for setting up the X.509 Hierarchy==&lt;br /&gt;
'''1.	Update the root-account'''  &lt;br /&gt;
&lt;br /&gt;
By starting the server the first time the root account is created and a private key plus corresponding certificate are generated. This account serves as admin-account for the server and as root-node of the X.509 Hierarchy. &lt;br /&gt;
It is necessary to reset the password, which can by done by loging in using the username: &amp;quot;root&amp;quot; and the password &amp;quot;123&amp;quot; and by navigating to &amp;quot;MySettings&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''2.	Creating an own issuer-account'''&lt;br /&gt;
&lt;br /&gt;
As it is recommended not to use the root-account for all the issuing procedures it is necessary to set up an account which is a sub-node from the root-account. This account is further on used to maintain a set of end-users. &lt;br /&gt;
In the first step the person, responsible for the issuer-account, has to register. In the second step, the owner of the root-account will need to log in and approve this request and grant this user issuer privileges. Once these settings are stored, the OpenSign server will generate a certificate for the issuer, which is publicly available on the issuers profile.&lt;br /&gt;
&lt;br /&gt;
Registering the issuer-account:&lt;br /&gt;
[[Image:Open_sign_server_reg.jpg]]&lt;br /&gt;
&lt;br /&gt;
Enabling the issuer-account by the root user:&lt;br /&gt;
[[Image:Open_sign_server_approve_issuer.jpg]]&lt;br /&gt;
&lt;br /&gt;
3.	End user registration&lt;br /&gt;
&lt;br /&gt;
Users may register and select the previously generated issuer-account (“owasp”) as their desired issuer. However, before they can use their account the issuer has to approve them first.&lt;br /&gt;
&lt;br /&gt;
Registration of an end-user: [[Image:Open_sign_server_reg_user.jpg]]&lt;br /&gt;
&lt;br /&gt;
4.	Certificate issuance&lt;br /&gt;
&lt;br /&gt;
It is possible to obtain a certificate by issuing a certificate sign request by use of the web-interface or by use of the client application. The form online can be found at: localhost:8080/csr. The processing of a certificate sign request with the client application is described above (command: csr).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Code Signing and Verification==&lt;br /&gt;
&lt;br /&gt;
This section describes the steps required for code-signing and verification supported by the OpenSign infrastructure.&lt;br /&gt;
&lt;br /&gt;
'''Signing'''&lt;br /&gt;
&lt;br /&gt;
1. Local generation of the private code-signing key. The key should be stored in a password-protected keystore.&lt;br /&gt;
&lt;br /&gt;
2. Generation of a certificate sign request (CSR)&lt;br /&gt;
&lt;br /&gt;
3. Processing the (CSR) by making use of the web-interface or the client application. Either way a certificate is returned on success. Furthermore, a copy of the certificate is stored within the server-infrastructure.&lt;br /&gt;
&lt;br /&gt;
4.Signing the code module by making use of the previously generated key.&lt;br /&gt;
&lt;br /&gt;
'''Verification'''&lt;br /&gt;
&lt;br /&gt;
1. Downloading the certificate by browsing the OpenSign X.509 hierarchy online or by use of the client application, which is the recommended option.&lt;br /&gt;
&lt;br /&gt;
2. Importing the certificate as a trusted certificate in the local key-store.&lt;br /&gt;
&lt;br /&gt;
3. Verifying the signed code module by use of the public key embedded in the downloaded certificate.&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55443</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55443"/>
				<updated>2009-02-25T09:14:28Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Code Signing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. To start the client enter following command:&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by calling a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate file and verifies it. Additionally, the application downloads and verifies the certificate chain. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Steps for setting up the X.509 Hierarchy==&lt;br /&gt;
'''1.	Update the root-account'''  &lt;br /&gt;
&lt;br /&gt;
By starting the server the first time the root account is created and a private key plus corresponding certificate are generated. This account serves as admin-account for the server and as root-node of the X.509 Hierarchy. &lt;br /&gt;
It is necessary to reset the password, which can by done by loging in using the username: &amp;quot;root&amp;quot; and the password &amp;quot;123&amp;quot; and by navigating to &amp;quot;MySettings&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''2.	Creating an own issuer-account'''&lt;br /&gt;
&lt;br /&gt;
As it is recommended not to use the root-account for all the issuing procedures it is necessary to set up an account which is a sub-node from the root-account. This account is further on used to maintain a set of end-users. &lt;br /&gt;
In the first step the person, responsible for the issuer-account, has to register. In the second step, the owner of the root-account will need to log in and approve this request and grant this user issuer privileges. Once these settings are stored, the OpenSign server will generate a certificate for the issuer, which is publicly available on the issuers profile.&lt;br /&gt;
&lt;br /&gt;
Registering the issuer-account:&lt;br /&gt;
[[Image:Open_sign_server_reg.jpg]]&lt;br /&gt;
&lt;br /&gt;
Enabling the issuer-account by the root user:&lt;br /&gt;
[[Image:Open_sign_server_approve_issuer.jpg]]&lt;br /&gt;
&lt;br /&gt;
3.	End user registration&lt;br /&gt;
&lt;br /&gt;
Users may register and select the previously generated issuer-account (“owasp”) as their desired issuer. However, before they can use their account the issuer has to approve them first.&lt;br /&gt;
&lt;br /&gt;
Registration of an end-user: [[Image:Open_sign_server_reg_user.jpg]]&lt;br /&gt;
&lt;br /&gt;
4.	Certificate issuance&lt;br /&gt;
&lt;br /&gt;
It is possible to obtain a certificate by issuing a certificate sign request by use of the web-interface or by use of the client application. The form online can be found at: localhost:8080/csr. The processing of a certificate sign request with the client application is described above (command: csr).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Code Signing and Verification==&lt;br /&gt;
&lt;br /&gt;
This section describes the steps required for code-signing and verification support by the OpenSign infrastructure.&lt;br /&gt;
&lt;br /&gt;
'''Signing'''&lt;br /&gt;
&lt;br /&gt;
1. Local generation of the private code-signing key. The key should be stored in a password-protected keystore.&lt;br /&gt;
&lt;br /&gt;
2. Generation of a certificate sign request (CSR)&lt;br /&gt;
&lt;br /&gt;
3. Processing the (CSR) by making use of the web-interface or the client application. Either way a certificate is returned on success. Furthermore, a copy of the certificate is stored within the server-infrastructure.&lt;br /&gt;
&lt;br /&gt;
4.Signing the code module by making use of the previously generated key.&lt;br /&gt;
&lt;br /&gt;
'''Verification'''&lt;br /&gt;
&lt;br /&gt;
1. Downloading the certificate by browsing the OpenSign X.509 hierarchy online or by use of the client application, which is the recommended option.&lt;br /&gt;
&lt;br /&gt;
2. Importing the certificate as a trusted certificate in the local key-store.&lt;br /&gt;
&lt;br /&gt;
3. Verifying the signed code module by use of the public key embedded in the downloaded certificate.&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55442</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55442"/>
				<updated>2009-02-25T09:00:06Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* User Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. To start the client enter following command:&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by calling a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate file and verifies it. Additionally, the application downloads and verifies the certificate chain. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Steps for setting up the X.509 Hierarchy==&lt;br /&gt;
'''1.	Update the root-account'''  &lt;br /&gt;
&lt;br /&gt;
By starting the server the first time the root account is created and a private key plus corresponding certificate are generated. This account serves as admin-account for the server and as root-node of the X.509 Hierarchy. &lt;br /&gt;
It is necessary to reset the password, which can by done by loging in using the username: &amp;quot;root&amp;quot; and the password &amp;quot;123&amp;quot; and by navigating to &amp;quot;MySettings&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''2.	Creating an own issuer-account'''&lt;br /&gt;
&lt;br /&gt;
As it is recommended not to use the root-account for all the issuing procedures it is necessary to set up an account which is a sub-node from the root-account. This account is further on used to maintain a set of end-users. &lt;br /&gt;
In the first step the person, responsible for the issuer-account, has to register. In the second step, the owner of the root-account will need to log in and approve this request and grant this user issuer privileges. Once these settings are stored, the OpenSign server will generate a certificate for the issuer, which is publicly available on the issuers profile.&lt;br /&gt;
&lt;br /&gt;
Registering the issuer-account:&lt;br /&gt;
[[Image:Open_sign_server_reg.jpg]]&lt;br /&gt;
&lt;br /&gt;
Enabling the issuer-account by the root user:&lt;br /&gt;
[[Image:Open_sign_server_approve_issuer.jpg]]&lt;br /&gt;
&lt;br /&gt;
3.	End user registration&lt;br /&gt;
&lt;br /&gt;
Users may register and select the previously generated issuer-account (“owasp”) as their desired issuer. However, before they can use their account the issuer has to approve them first.&lt;br /&gt;
&lt;br /&gt;
Registration of an end-user: [[Image:Open_sign_server_reg_user.jpg]]&lt;br /&gt;
&lt;br /&gt;
4.	Certificate issuance&lt;br /&gt;
&lt;br /&gt;
It is possible to obtain a certificate by issuing a certificate sign request by use of the web-interface or by use of the client application. The form online can be found at: localhost:8080/csr. The processing of a certificate sign request with the client application is described above (command: csr).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Open_sign_server_reg.jpg&amp;diff=55441</id>
		<title>File:Open sign server reg.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Open_sign_server_reg.jpg&amp;diff=55441"/>
				<updated>2009-02-25T08:58:30Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Open_sign_server_approve_issuer.jpg&amp;diff=55440</id>
		<title>File:Open sign server approve issuer.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Open_sign_server_approve_issuer.jpg&amp;diff=55440"/>
				<updated>2009-02-25T08:54:13Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Open_sign_server_reg_user.jpg&amp;diff=55439</id>
		<title>File:Open sign server reg user.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Open_sign_server_reg_user.jpg&amp;diff=55439"/>
				<updated>2009-02-25T08:53:38Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55438</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55438"/>
				<updated>2009-02-25T08:42:30Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Client Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. To start the client enter following command:&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by calling a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate file and verifies it. Additionally, the application downloads and verifies the certificate chain. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55437</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55437"/>
				<updated>2009-02-25T08:38:03Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Client Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. To start the client enter following command:&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by entering a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate and verifies it by downloading the certificate chain from the server and verifying all certificates. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55436</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55436"/>
				<updated>2009-02-25T08:37:04Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Client Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OSSJClient-1.0. The usage of the command line client is as follows.&lt;br /&gt;
&lt;br /&gt;
   java -jar OSSJClient-[version].jar [command]&lt;br /&gt;
&lt;br /&gt;
Executing the client application without the command-parameter, will print a list of all possible commands to the console. All commands take mandatory and optional parameter, which are also depicted by entering a command without any parameter.&lt;br /&gt;
&lt;br /&gt;
The possible commands are:&lt;br /&gt;
&lt;br /&gt;
'''verifycert'''&lt;br /&gt;
&lt;br /&gt;
This command takes a certificate and verifies it by downloading the certificate chain from the server and verifying all certificates. A detailed transcript is printed to the console.&lt;br /&gt;
&lt;br /&gt;
'''getcert'''&lt;br /&gt;
&lt;br /&gt;
This command retrieves a certificate from a OpenSign resource (e.g. root/owasp/user1) and either prints it to the console or stores it in a file. Furthermore, the format of the certificate may be chosen (PEM or binary).&lt;br /&gt;
&lt;br /&gt;
'''csr'''&lt;br /&gt;
&lt;br /&gt;
This command processes a certificate sign request. The request is sent to the server, which takes the login credentials and checks if the user is approved to have a OpenSign certificate and if so a certificate is generated and sent to the user in return.&lt;br /&gt;
&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55435</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55435"/>
				<updated>2009-02-25T08:23:12Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Server Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
'''Certificate Authoriy:''' This link allows, on the one hand, unauthenticated users to brows the X.509 hierarchy, starting from the root node down to the leaves, and on the other hand authenticated users to issue certification requests. Once issued certificates are easily accessible and may be downloaded in PEM or binary format.&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' Form for registration of new users with the OpenSign server. New users have to enter some personal details and have to select an issuer (super-node), within the X.509 hierarchy, which needs to approve the registration request before the user will be able to use this service.&lt;br /&gt;
&lt;br /&gt;
'''MySettings:''' This link is only accessible if a user is authenticated. Every user may maintain his profile her. Furthermore, if a user is dedicated as issuer, a list of all sub-nodes is shown. As the issuer is responsible for maintaining the sub-nodes, it is his choice to decide whether to approve a particular user to use the certification service or not. Once a user is approved, the issuer may also decide if he can act as an issuer himself or not.&lt;br /&gt;
&lt;br /&gt;
'''Login:''' User Login&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Open_sign_server_home.jpg&amp;diff=55434</id>
		<title>File:Open sign server home.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Open_sign_server_home.jpg&amp;diff=55434"/>
				<updated>2009-02-25T08:11:30Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: uploaded a new version of &amp;quot;Image:Open sign server home.jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55433</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55433"/>
				<updated>2009-02-25T08:09:16Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Server Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
&lt;br /&gt;
Open a console and brows into folder OpenSignServer-1.0. Following command will start the server application:&lt;br /&gt;
&lt;br /&gt;
   java -jar jar\OpenSignServer-1.0.jar&lt;br /&gt;
&lt;br /&gt;
The web-based user interface is accessible at: http://localhost:8080/&lt;br /&gt;
&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
Following links are accessible:&lt;br /&gt;
&lt;br /&gt;
'''Home:''' Initial page&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55432</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55432"/>
				<updated>2009-02-25T08:05:51Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* User Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server and client binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
* Java runtime 1.6&lt;br /&gt;
* Optional: MySql DB &lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
On default nothing besides the unpacking of the binary-packages has to be done for installing server and client application.&lt;br /&gt;
If one wants to enable specific settings it is recommended to follow the instructions of the readme.txt files, which are located in the root of each directory after unpacking. Note that the server will run in memory on default, which is only good for testing as the data is lost by shutting down the server. However, this behaviour can easily be changed by the use of a MySql DB (please refer to: readme.txt).&lt;br /&gt;
&lt;br /&gt;
==Server Usage==&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55431</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55431"/>
				<updated>2009-02-25T08:01:09Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* User Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
&lt;br /&gt;
This section describes the installation and usage of the server- and client-binaries, which can be downloaded above. As all applications are written in pure Java the following instructions are not bound to a specific platform.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
==Server Usage==&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55355</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55355"/>
				<updated>2009-02-24T12:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Server Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
==Installation==&lt;br /&gt;
==Server Usage==&lt;br /&gt;
[[Image:Open_sign_server_home.jpg|600px]]&lt;br /&gt;
&lt;br /&gt;
==Client Usage==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Open_sign_server_home.jpg&amp;diff=55354</id>
		<title>File:Open sign server home.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Open_sign_server_home.jpg&amp;diff=55354"/>
				<updated>2009-02-24T12:45:54Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55352</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55352"/>
				<updated>2009-02-24T10:20:45Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* User Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
==Installation==&lt;br /&gt;
==Server Usage==&lt;br /&gt;
==Client Usage==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55351</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55351"/>
				<updated>2009-02-24T10:19:39Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Java Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
==Installation==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
=Future development=&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55350</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55350"/>
				<updated>2009-02-24T10:19:07Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* User Documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
==Installation==&lt;br /&gt;
==Setting up the X.509 Hierarchy==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55349</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55349"/>
				<updated>2009-02-24T10:01:31Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Releases */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=User Documentation=&lt;br /&gt;
==Installation==&lt;br /&gt;
==Code Signing==&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55348</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55348"/>
				<updated>2009-02-24T09:56:19Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* .NET Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55347</id>
		<title>Category:OWASP OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project&amp;diff=55347"/>
				<updated>2009-02-24T09:55:25Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template OpenSign Server Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44655</id>
		<title>Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44655"/>
				<updated>2008-10-27T07:42:18Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the certificate sign requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 30% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
none&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Include user documentation in Project's OWASP Wiki page(s) &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Include online documention built into tool (based on required user documentation) &lt;br /&gt;
* Be run through Fortify Software's open source review (if appropriate) and FindBugs&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44654</id>
		<title>Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44654"/>
				<updated>2008-10-27T07:40:05Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the Certificate Sign Requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 30% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
none&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Include user documentation in Project's OWASP Wiki page(s) &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Include online documention built into tool (based on required user documentation) &lt;br /&gt;
* Be run through Fortify Software's open source review (if appropriate) and FindBugs&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44653</id>
		<title>Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44653"/>
				<updated>2008-10-27T07:37:49Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the Certificate Sign Requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 30% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
none&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Include online documention built into tool (based on required user documentation) &lt;br /&gt;
* Be run through Fortify Software's open source review (if appropriate) and FindBugs&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44652</id>
		<title>Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44652"/>
				<updated>2008-10-27T07:34:31Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the Certificate Sign Requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 30% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
none&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=44651</id>
		<title>Project Information:template OpenSign Server Project - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=44651"/>
				<updated>2008-10-27T07:33:56Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''First comments''':&lt;br /&gt;
&lt;br /&gt;
* it would be nice it it would be possible to simply download and run the code&lt;br /&gt;
for the server and the client (I have made some tests under linux, this seems not to be the case for the latter releases available on the project web page)&lt;br /&gt;
* available scripts for starting both under MS win &amp;amp; linux, with default config&lt;br /&gt;
* available user documentation: what can I do with each tool, how (for instance under the form of a '5 minutes introduction' and reference list of available functions) ?&lt;br /&gt;
* is the C# code available for download and execution ?&lt;br /&gt;
* it would be nice if the 'trunk' would be documented in a way that let the user know:&lt;br /&gt;
- how to compile everything (without needing to install libraries from the web) ?&lt;br /&gt;
&lt;br /&gt;
- how to run the server and clients (a global 'readme' file is missing).&lt;br /&gt;
&lt;br /&gt;
* Moreover, the 'opensign-design' document could be completed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44650</id>
		<title>Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_Self_Evaluation_-_B&amp;diff=44650"/>
				<updated>2008-10-27T07:33:39Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the Certificate Sign Requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 30% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=44649</id>
		<title>Project Information:template OpenSign Server Project - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=44649"/>
				<updated>2008-10-27T07:32:32Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
At this point the core functionality of the OpenSign project has been developed and tested. This includes the issuing and verifying of certificates within a client server infrastructure. Users must be authenticated and approved by an issuer to use the issuing-service. The issuing is done easily by making use of the client application or online via a web-form. However, OpenSign is not an independent solution for code signing yet. It relies on java-keytool (or an application with the same intention) to generate the client side keys and the Certificate Sign Requests. There is no graphical interface for the client in place. Also the support of .NET code signing was not taken into account yet. &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
OpenSign Server: 80%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 90%&lt;br /&gt;
&lt;br /&gt;
Documentation: 30% &lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''First comments''':&lt;br /&gt;
&lt;br /&gt;
* it would be nice it it would be possible to simply download and run the code&lt;br /&gt;
for the server and the client (I have made some tests under linux, this seems not to be the case for the latter releases available on the project web page)&lt;br /&gt;
* available scripts for starting both under MS win &amp;amp; linux, with default config&lt;br /&gt;
* available user documentation: what can I do with each tool, how (for instance under the form of a '5 minutes introduction' and reference list of available functions) ?&lt;br /&gt;
* is the C# code available for download and execution ?&lt;br /&gt;
* it would be nice if the 'trunk' would be documented in a way that let the user know:&lt;br /&gt;
- how to compile everything (without needing to install libraries from the web) ?&lt;br /&gt;
&lt;br /&gt;
- how to run the server and clients (a global 'readme' file is missing).&lt;br /&gt;
&lt;br /&gt;
* Moreover, the 'opensign-design' document could be completed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=44648</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=44648"/>
				<updated>2008-10-27T07:06:55Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:gary.m.burns@gmail.com '''Gary Burns''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/garymburns Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project - code.google.com]&lt;br /&gt;
* [[:Image:OpenSign Server Demo oss 0 4 ossjclient 0 9.ppt|OpenSign Server Demo/ppt]]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-1.0-bin.tar.gz OpenSignServer-1.0-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-1.0-bin.tar.gz OSSJClient-1.0-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version has been modified to work with the server version 1.0&lt;br /&gt;
&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=44647</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=44647"/>
				<updated>2008-10-27T07:06:04Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:gary.m.burns@gmail.com '''Gary Burns''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/garymburns Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project - code.google.com]&lt;br /&gt;
* [[:Image:OpenSign Server Demo oss 0 4 ossjclient 0 9.ppt|OpenSign Server Demo/ppt]]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-1.0-bin.tar.gz OpenSignServer-1.0-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-1.0-bin.tar.gz OSSJClient-1.0-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 1.0 (26st of October 08)===&lt;br /&gt;
&lt;br /&gt;
* This version is working with the Java client version 1.0&lt;br /&gt;
* An &amp;quot;About&amp;quot; button has been added&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=44646</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=44646"/>
				<updated>2008-10-27T06:48:10Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:gary.m.burns@gmail.com '''Gary Burns''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/garymburns Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project - code.google.com]&lt;br /&gt;
* [[:Image:OpenSign Server Demo oss 0 4 ossjclient 0 9.ppt|OpenSign Server Demo/ppt]]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-1.0-bin.tar.gz OpenSignServer-1.0-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-1.0-bin.tar.gz OSSJClient-1.0-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=43246</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=43246"/>
				<updated>2008-10-14T08:05:43Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:gary.m.burns@gmail.com '''Gary Burns''']&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project - code.google.com]&lt;br /&gt;
* [[:Image:OpenSign Server Demo oss 0 4 ossjclient 0 9.ppt|OpenSign Server Demo/ppt]]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-0.5-bin.tar.gz OpenSignServer-0.5-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-0.9-bin.tar.gz OSSJClient-0.9-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Version 0.5 (14th of October 08)===&lt;br /&gt;
&lt;br /&gt;
* Users must now be enabled to use the certification service by the the issuer above in order to build up chains of trust&lt;br /&gt;
* The settins page for issuers got extended for maintaining the subordinate entities&lt;br /&gt;
* Several server pages got enhanced in terms of functionality and design&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=43245</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=43245"/>
				<updated>2008-10-14T07:52:33Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:gary.m.burns@gmail.com '''Gary Burns''']&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project - code.google.com]&lt;br /&gt;
* [[:Image:OpenSign Server Demo oss 0 4 ossjclient 0 9.ppt|OpenSign Server Demo/ppt]]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-0.5-bin.tar.gz OpenSignServer-0.5-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-0.9-bin.tar.gz OSSJClient-0.9-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_Self_Evaluation_-_A&amp;diff=39314</id>
		<title>Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_Self_Evaluation_-_A&amp;diff=39314"/>
				<updated>2008-09-11T13:53:34Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The Certification Authority functionality including a web interface as well as a web-service one has been realised. It is possible to generate X.509 hierarchies whereas each public key is easily accessible to anyone who intends to use it. Furthermore, a Java client application allows the certificate download, the posting of a PKCS10 certificate signing request in order to obtain a new certificate and the certificate chain verification. &lt;br /&gt;
&lt;br /&gt;
Initial objectives, which have not been met so far, are the upload of code modules - having the server sign the modules, the use of cryptography hardware and the support for .NET signing. Furthermore, educational documentation of code signing/verifying is not written yet.&lt;br /&gt;
We consider that the upload of code modules as well as the usage of cryptographic hardware should not be an objective for the scope of SOC 2008. We think it is better to focus on a light weight version of the server, which would attract a broader range of users instead of only those having sophisticated/expensive infrastructures in place.&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
OpenSign Server: 70%&lt;br /&gt;
&lt;br /&gt;
Client Tools – OSSJClient: 80%&lt;br /&gt;
&lt;br /&gt;
Documentation: 20%&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. What kind of help is required either from the Reviewers or from the OWASP Community?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
No additional help is required at the moment.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=37423</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=37423"/>
				<updated>2008-08-27T23:31:55Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-0.4-bin.tar.gz OpenSignServer-0.4-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-0.9-bin.tar.gz OSSJClient-0.9-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Version 0.9 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Commands supported: &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=37422</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=37422"/>
				<updated>2008-08-27T23:30:25Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* server: [http://opensign-project.googlecode.com/files/OpenSignServer-0.4-bin.tar.gz OpenSignServer-0.4-bin.tar.gz ]&lt;br /&gt;
* client: [http://opensign-project.googlecode.com/files/OSSJClient-0.9-bin.tar.gz OSSJClient-0.9-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=37421</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=37421"/>
				<updated>2008-08-27T23:28:52Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.3-bin.tar.gz OpenSignServer-0.3-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.4 (28th of August 08)===&lt;br /&gt;
&lt;br /&gt;
* Certificate chains are now set up properly. This includes the right values in the certificate as well as appropriate key-handling of the key store. Dummy code got removed broadly. &lt;br /&gt;
* This version supports the use of OSSJClient version 0.9 for commands &amp;quot;getcert&amp;quot;, &amp;quot;verifycert&amp;quot; and &amp;quot;csr&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=35354</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=35354"/>
				<updated>2008-08-05T10:05:14Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.3-bin.tar.gz OpenSignServer-0.3-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.3 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34437</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34437"/>
				<updated>2008-07-22T12:58:32Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.3-bin.tar.gz OpenSignServer-0.3-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34436</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34436"/>
				<updated>2008-07-22T12:55:53Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.3-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34394</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34394"/>
				<updated>2008-07-21T17:19:14Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* OpenSign Server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.2-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (21th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Easy extendable persistence layer, which is set up using Hibernate – Annotations.&lt;br /&gt;
* Possibility to run server in memory, whereas data is lost when the server process is terminated, or to run the server on top of a MYSQL database. &lt;br /&gt;
* Logging mechanism got enhanced which involves means to pipe the log information from OpenSign server as well as from Jetty and Hibernate to a log file.&lt;br /&gt;
* Same functionality as version 0.2 from a user point of view.  &lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34198</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34198"/>
				<updated>2008-07-16T21:59:06Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Version 0.2 (1st of July 08) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.2-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.1 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34194</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34194"/>
				<updated>2008-07-16T19:42:06Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.2-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;br /&gt;
&lt;br /&gt;
TBC&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34192</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34192"/>
				<updated>2008-07-16T19:40:56Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Java Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.2-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;br /&gt;
&lt;br /&gt;
===.NET Client===&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34191</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34191"/>
				<updated>2008-07-16T19:40:21Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: /* Java Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.2-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure to sign and verify Jar archives.&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34190</id>
		<title>Project Information:template OpenSign Server Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project&amp;diff=34190"/>
				<updated>2008-07-16T19:39:33Z</updated>
		
		<summary type="html">&lt;p&gt;Philipp Potisk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. - The service will allow all .NET and Java code modules to be uploaded to the service to be signed by a community code signing key. Each community (such as OWASP) will have a key and corresponding Software Publishing Certificate (SPC) which can optionally be embedded in the code module itself. Generally, however, the service is intended for developers and the wider community of concerned users that want to ensure that their downloaded portable executable is exactly what it purports to be. The root key will be stored in an HSM and will sign an SPC from a locally generated key-pair of which the public key will be sent to the service. Key pair generation can be made and submitted using standard .NET delay signing and jar signing tools distributed with the SDKs, however, the project remit will ensure that a client-side graphical tool for each environment is available to generate the keys pairs needed to sign code with and allow submission to the code signing service for signing and generation of SPC by the server's proprietary CA. Anonymity will not be allowed so the project will include a database of users which will be the basis of directory for SPCs. There will be a web and web services interface using an online login and WS-Security respectively which will allow the code to be uploaded on demand and signed by a code signing key with the option to embed the certificate or not. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:philipp_p(at)gmx.at '''Phil Potisk''']&amp;lt;br&amp;gt;[mailto:techierebel(at)yahoo.co.uk '''Richard Conway''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-opensign-server-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-OpenSign-Server-Project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:pierre.parrend(at)insa-lyon.fr '''Pierre Parrend''']&amp;lt;br&amp;gt;[http://www.rzo.free.fr/ Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/opensign-project/ OpenSign Project]&lt;br /&gt;
* current release: [http://opensign-project.googlecode.com/files/OpenSignServer-0.2-bin.tar.gz OpenSignServer-0.2-bin.tar.gz ]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Releases=&lt;br /&gt;
==OpenSign Server==&lt;br /&gt;
===Version 0.2 (14th of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Demo-wise set up of an X.509 hierarchy intending to provide code siging certificates. This involves one root issuer, an unlimited number of sub-issuers and end-users.     &lt;br /&gt;
* End-users may issue a certificate sign request and obtain the certificate in return.&lt;br /&gt;
* Demo accounts of to end-users (&amp;quot;user1&amp;quot;, &amp;quot;user2&amp;quot;) and two issuers (&amp;quot;root&amp;quot;, &amp;quot;user3&amp;quot;) each with password &amp;quot;123&amp;quot;.    &lt;br /&gt;
* Possibility for registering new end-users and issuers.&lt;br /&gt;
*	Session handling - login, logout of users    &lt;br /&gt;
* Storage of issuer key-pair's and all certificates in server side key store.&lt;br /&gt;
* Public access of all certificates in the system, with support of binary and PEM format. Eg.: Certificate from root issuer may be retrieved &lt;br /&gt;
*:  - in binary format (default): http://localhost:8080/root?property=cert&lt;br /&gt;
*:  - or PEM formatted: http://localhost:8080/root?property=cert&amp;amp;responseFormat=PEM     &lt;br /&gt;
* User/resource profile, which is accessible at the resource path without further parameters, eg.: http://localhost:8080/root/user1&lt;br /&gt;
&lt;br /&gt;
===Version 0.2 (1st of July 08)===&lt;br /&gt;
&lt;br /&gt;
* Access of root certificate via HTTP-GET http://localhost:8080/ca&lt;br /&gt;
* Certificate issuing by sending a Certificate Signing Request (PEM-formatted PKCS#10 structure) via HTTP-POST to http://localhost:8080/ca/csr&lt;br /&gt;
&lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
=OpenSign Server=&lt;br /&gt;
&lt;br /&gt;
'''Goal'''&lt;br /&gt;
&lt;br /&gt;
The goal of the Opensign Server (OSS) is to serve as trusted third party in order to prove the integrity and authenticity of binaries. To meet this goal following roadmap will be implemented:&lt;br /&gt;
&lt;br /&gt;
'''Version 0.1'''&lt;br /&gt;
&lt;br /&gt;
This version is a proof of concept implementation, which shows that processing a Certificate Signing Request (CSR) and issuing a X.509 certificate is working in an efficient way. Furthermore the generation and distributing of the root certificate is also supported.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.2'''&lt;br /&gt;
&lt;br /&gt;
The server is enhanced by the possibility to support certificate issuing for multiple users. In this case users must be authenticated before generating a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.3'''&lt;br /&gt;
&lt;br /&gt;
User management is done through the persistence layer, where Hibernate is the technology of choice. It is now possible to dynamically add users through the web-interface.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.4'''&lt;br /&gt;
&lt;br /&gt;
The role of the Review is introduced. Users must be associated with a Reviewer before being able to generate a certificate.&lt;br /&gt;
&lt;br /&gt;
'''Version 0.5'''&lt;br /&gt;
&lt;br /&gt;
The web-interface is enriched with dynamically generated sites which allows the maintenance of the system depending of the user role.&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Well tested and documented PKI for code signing which is running online at: www.???.com. '''This is the goal for Summer of Code 2008!'''&lt;br /&gt;
&lt;br /&gt;
'''Version 2.0'''&lt;br /&gt;
&lt;br /&gt;
The second version of the OSS allows the server side code signing. Code modules are uploaded, virus scanned and signed by a corresponding key. No client side key management is required. Furthermore, this service has a downloading area where anybody can download the signed modules.&lt;br /&gt;
 &lt;br /&gt;
==OpenSign Client==&lt;br /&gt;
===Java Client===&lt;br /&gt;
&lt;br /&gt;
'''Version 1.0'''&lt;br /&gt;
&lt;br /&gt;
Command line application, extending Java keytools functionality to make use of the OpenSign infrastructure. Only Jar archive signing is supported.&lt;/div&gt;</summary>
		<author><name>Philipp Potisk</name></author>	</entry>

	</feed>