- From: Christopher B Ferris <chrisfer@us.ibm.com>
- Date: Wed, 24 Nov 2004 17:18:23 -0500
- To: "David Orchard" <dorchard@bea.com>
- Cc: Francisco Curbera <curbera@us.ibm.com>, "Martin Gudgin" <mgudgin@microsoft.com>, public-ws-addressing@w3.org, public-ws-addressing-request@w3.org
Dave, The "hole" you describe with pipelining applies equally to all SOAP headers and the SOAP body as well. It is not constrained to ref props/params. I don't understand what the issue is really. Cheers, Christopher Ferris STSM, Emerging e-business Industry Architecture email: chrisfer@us.ibm.com blog: http://webpages.charter.net/chrisfer/blog.html phone: +1 508 377 9295 public-ws-addressing-request@w3.org wrote on 11/24/2004 04:13:41 PM: > > > > > -----Original Message----- > > From: Martin Gudgin [mailto:mgudgin@microsoft.com] > > Sent: Wednesday, November 24, 2004 11:58 AM > > To: David Orchard; Francisco Curbera > > Cc: Christopher B Ferris; public-ws-addressing@w3.org > > Subject: RE: Composibility problems with refps > > > <snip/> > > > > I think it's just a) because b) is done by default in most > > > cases, where > > > the security stuff just signs whatever it's given and it's at > > > the end of > > > the pipeline - like Rich showed. > > > > But your still talking about comprimising the pipeline itself. It's > not > > an attack someone could mount on the wire. > > Depends if the pipeline is "on the wire". The pipeline compromise could > be within single node or cluster, but the pipeline could also be "on the > wire". One node might construct part of the message, another node might > construct another part of the message, and another node might apply > security. > > > > > > Very few systems that I've heard of > > > have the software that generates message content (particularly EPRs) > > > secure it right away - which would prevent the hole that I'm talking > > > about. > > > > I'm not sure what you mean by 'right away'. Do you mean before it > first > > appears on the wire? Or while it's in the processing pipeline? > > > > Right away as in just b4 being put in the pipeline or the immediate next > step. One way to prevent this attack would be to secure any EPRs before > they were put into the pipeline. > > > > > > And it's not inserting into arbitrary parts of the message, > > > it's just in > > > an EPR. > > > > > > So, the hacker would have to be able to: > > > a) inject arbitrary XML into EPR(s) in a message. > > > > I'm confused. Are we talking about seuring the wsa:EndpointReference > > element? Or the headers which are inserted into a message? Or both? > > > > I think both but I'm mostly concerned about headers. WS-A defines 2 > headers that use EPRs, but other specs, like WS-Eventing, > WS-ReliableMessaging, and WS-Coordination, use EPRs as well. These all > have the same vulnerability. > > > > > > > And this problem is prevented in WS-A by requiring that REFps are > not > > > echoed directly and unmodified as soap header blocks. > > > > I'm not sure how this helps plug the security hole. > > > > If the RefPs are echoed in a wrapper, then they aren't soap header > blocks - which I know you think is a big bug. The header extension > could be > <header><transfer> > > And if the echoing is in a wrapper, like > <header><RefP><transfer> > > Then the transfer header extension can never be set by the WS-A echoing > processing model. By putting the RefPs as a wrapper, the hacker can't > get the echoer to invoke the soap header block functionality. Thus the > security hole is plugged. > > > > > > > It seems hard to quantify the risk of this. One approach is > > > to say "oh > > > well, so sad". Another approach is to do some work in a spec > > > to prevent > > > the problem. > > > > I'm still not quite seeing exactly what that problem is. > > > > :-( > > :-( indeed. I was hoping by now we could at least agree: 1) there is a > hole and 2) there is at least 1 solution to the hole. Then we can > debate 3) the cost/benefit of plugging the hole, depending upon the > solution. Until we get to 1 & 2, we can't really debate 3. > > Dave >
Received on Wednesday, 24 November 2004 22:19:01 UTC