W3C home > Mailing lists > Public > public-ws-resource-access-notifications@w3.org > November 2009

[Bug 8273] New: "Security Considerations" sections vague and misleading

From: <bugzilla@wiggum.w3.org>
Date: Fri, 13 Nov 2009 06:09:37 +0000
To: public-ws-resource-access-notifications@w3.org
Message-ID: <bug-8273-2780@http.www.w3.org/Bugs/Public/>
http://www.w3.org/Bugs/Public/show_bug.cgi?id=8273

           Summary: "Security Considerations" sections vague and misleading
           Product: WS-Resource Access
           Version: PR
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: All
        AssignedTo: public-ws-resource-access-notifications@w3.org
        ReportedBy: gilbert.pilz@oracle.com
         QAContact: public-ws-resource-access-notifications@w3.org


WS-Eventing, WS-Transfer, WS-MetadataExchange, and WS-Enumeration each contain
a "Security Considerations" section. These sections contain various bits of
"pious advice" that have no normative value and little to do with the protocols
to which they apply. If you understand the basics of web services security,
these sections won't teach you anything new and don't provide any insight into
the particular problems of securing their corresponding protocols. For example,
the Security Considerations section of WS-Eventing says nothing about making
sure that the sender of a Renew, GetStatus, or Unsubscribe request is the same
entity as the sender of the Subscribe request that created the subscription
that is being acted upon.

Proposal 1: remove the "Security Considerations" sections from WS-Eventing,
WS-Transfer, WS-MetadataExchange, and WS-Enumeration.

Proposal 2: rewrite the "Security Considerations" sections from WS-Eventing,
WS-Transfer, WS-MetadataExchange, and WS-Enumeration along the following
guidelines:

1. Identify the specific resources that need to be protected (e.g.
subscriptions, enumeration contexts, etc.)

2. Describe common methods for protecting these resources including, but not
limited to, the use of WS-Security and related technologies. Relate these
methods to the protocol in question.

3. Identify any special challenges posed to (2) due to the nature of the
protocols, etc.


-- 
Configure bugmail: http://www.w3.org/Bugs/Public/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
You are the assignee for the bug.
Received on Friday, 13 November 2009 06:09:46 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:06:36 UTC