Hi,

We usually add a timestamp and sign the timestamp as well. This will
ensure that this message cannot be replayed after the expiration of
the timestamp.

Thanks,
Ruchith

On 8/28/06, Jones, Alan R <[EMAIL PROTECTED]> wrote:
I am trying to make sure that Rampart is failing my spoofed SOAP
messages legitimately.

I configure my client dynamically to use Signature for OutflowSecurity
action; I run the test app, and via TCPMON I see the SOAP message was
correctly set for the service. All runs fine.  I then copy and paste the
SOAP message from TCPMON and resend it to the service from another
method in test app. I expect it to fail, to verify security is working
correctly.

My question, in order to make sure my process is legit, is:

How does the security engine fail it? The signature value in the SOAP
security header is exactly the same everytime I send the message,
whether I send it normally from the client or I copy and paste and
resend to create a failure condition. Again, it does fail it as desired
but I am not sure it is failing for the right reason. There is no
timestamp, all data going across in the SOAP header (actual or spoofed)
is exactly the same. So how does it know that the copied/pasted/spoofed
SOAP is false message?



Thanks,

Alan J



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




--
www.ruchith.org

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to