- From: Rich Salz <rsalz@datapower.com>
- Date: Mon, 7 Mar 2005 20:17:56 -0500 (EST)
- To: "Rice, Ed \(HP.com\)" <ed.rice@hp.com>
- cc: "public-ws-addressing@w3.org" <public-ws-addressing@w3.org>, "www-tag@w3.org" <www-tag@w3.org>
> I guess it depends on the content. Normally when you use a SOAP
> intermediary you would have your SSL connection with the intermediary if
> your concerned about the validity of the content. That way the
> intermediary becomes a trusted source (and it in-turn would have to have
> a trust relationship with the up-stream author of the content).
That strikes me as turning an architectural limitation into a feature.
If I sign my content, I don't have to trust a SOAP intermediary to do
anything more than it's business. If that intermediary gets
compromised, *my* content won't get screwed up. (Choicepoint, anyone?)
You don't trust every router that might touch your TCP packets, do you?
Of course not -- that's why you use SSL. Why is the SOAP situation
any different?
I want end-to-end security, not hop-by-hop. I'm not alone. :)
/r$
--
Rich Salz Chief Security Architect
DataPower Technology http://www.datapower.com
XS40 XML Security Gateway http://www.datapower.com/products/xs40.html
Received on Tuesday, 8 March 2005 01:18:00 UTC