2024-08-21

Date and Location

Aug 21, 2024 at 15:00-16:00 (EEST, UTC+3)

Location: Microsoft Teams

Attendees

  • Petteri Kivimäki (NIIS)

  • Raido Kaju (NIIS)

  • Gustavo Giorgetti

  • Jalmar Jerlei

  • Oleksii Danyliuk

Discussion items

#

Item

Notes

#

Item

Notes

1

Summary of development activities

Summary of ongoing development activities.

2

X-Road 8 status update

Latest news on X-Road 8 development.

Message logging

  • Making the message log implementation eIDAS compliant requires disabling batch signatures.

    • Currently, the Security Server does not support non-batch signatures.

  • According to initial performance tests:

    • Non-batch signatures are about 10% slower than batch signatures (with soft token) when using X-Road’s own implementation.

    • If the Digital Signature Service (DSS) library by the European Commission is used for signing, non-batch signatures are about 30% slower than batch signatures.

    • Also several other factors (e.g., the data space protocol, changes to trust framework, making the architecture cloud native) will impact on the X-Road 8 performance which is why more effort will be put on the overall performance later.

  • To minimise the impact on the performance, we have decided to use the DSS library for signature verification only and use X-Road's own implementation for signing.

  • Verifying a non-batch signature afterwards requires that all the message parts are included in the message log database and ASiC container.

    • Currently, the message log only supports one attachment per message (REST body is logged as an attachment) and SOAP attachments are never logged.

  • X-Road 7 can continue to use batch-signatures, but being interoperable with X-Road 8 requires supporting non-batch signatures that can be achieved by implementing two changes:

    • Support for validating non-batch signatures (proxy).

    • Persisting all message attachments to message log when non-batch signing is used (messagelog).

  • The changes in X-Road 7 do not:

    • Affect the Security Server performance between two X-Road 7 Security Servers.

    • Make X-Road 7 ASiC containers eIDAS compliant.

    • Limit the available logging configuration options (full logging / metadata logging / no logging).

  • X-Road 8 is backwards compatible with X-Road 7 starting from the version that includes the changes.

    • For example, if the changes are included in version 7.6.0, X-Road 8 is backwards compatible with X-Road 7 starting from version 7.6.0. Instead, older versions are not backwards compatible with X-Road 8.

  • Making the message log implementation eIDAS compliant in X-Road 8 does not affect the available logging configuration options (full logging / metadata logging / no logging).

    • X-Road 8 will continue to support the same logging configuration options already supported by X-Road 7.

    • Message log records produced by X-Road 8 are eIDAS compliant only when full logging is enabled and both message exchange parties use X-Road 8 Security Server.

      • Message log records produced by X-Road 8 are not eIDAS compliant if the other data exchange party uses X-Road 7 Security Server.

  • Instead, based on the current understanding, batch timestamping can still be used in X-Road 8.

Changes to the X-Road architecture

  • Initial plan (that is subject to change) of the X-Road 8 Security Server architecture has been created.

  • One goal is to improve X-Road’s cloud compatibility and make using X-Road easier in the cloud.

    • For example, support scaling the Security Server on a component level (e.g., signer, proxy), enable the use of services provided by cloud platforms (e.g., secret storage).

  • The current deployment options (Ubuntu + RHEL) will be supported too - users are not forced to use cloud and/or containers.

  • Some changes may be introduced already in X-Road 7 and they don’t affect existing users.

    • For example, make some currently hard-coded configuration items configurable using the current hard-coded values as defaults.

The X-Road JIRA has a detailed list of ongoing tasks.

3

Open topics



Next meetings

  • Meeting 26, September 18 2024, 15:00-16:00 (EEST, UTC +3)

  • Meeting 27, October 23 2024, 15:00-16:00 (EEST, UTC +3)

  • Meeting 28, November 20 2024, 15:00-16:00 (EET, UTC +2)

  • Meeting 29, December 18 2024, 15:00-16:00 (EET, UTC +2)

  • Meeting 30, January 22 2025, 15:00-16:00 (EET, UTC +2)

  • Meeting 31, February 19 2025, 15:00-16:00 (EET, UTC +2)

  • Meeting 32, March 19 2025, 15:00-16:00 (EET, UTC +2)