- From: <Noah_Mendelsohn@lotus.com>
- Date: Tue, 23 May 2000 11:45:12 -0400
- To: Michael Condry <Michael.Condry@eng.sun.com>
- Cc: andrewl@microsoft.com, Michael.Condry@eng.sun.com, xml-dist-app@w3.org, Andrew_Donoho/Austin/IBM@lotus.com
Andrew Donaho of IBM demonstrated an experimental implementation of SOAP glue into the DOM exposed by a browser. One machine can therefore script anothers UI and browser content. In general, if you expose an insecure API to the network, you will be raising security issues. I believe that any industrial strength implementation of such DOM/network services would have to have a carefully fleshed out security architecture. Of course, there is a broader question as to whether exposing such a DOM is the right thing to do, and security is part of that question. It's not fundamentally a SOAP issue...it's that you are making a big mistake if you run any of these systems (SOAP, XML-RPC, etc.) in a mode where it has access to arbitrary objects on your system, or to particular objects without the appropriate security in place. ------------------------------------------------------------------------ Noah Mendelsohn Voice: 1-617-693-4036 Lotus Development Corp. Fax: 1-617-693-8676 One Rogers Street Cambridge, MA 02142 ------------------------------------------------------------------------ Michael Condry <Michael.Condry@eng.sun.com> Sent by: xml-dist-app-request@w3.org 05/22/00 06:42 PM Please respond to Michael Condry To: Michael.Condry@eng.sun.com, xml-dist-app@w3.org, andrewl@microsoft.com cc: (bcc: Noah Mendelsohn/CAM/Lotus) Subject: RE: XML protocol security I asked IBM to clarify.
Received on Tuesday, 23 May 2000 11:51:29 UTC