Hi all,
Ruchith thank you for the answer. I will create a JIRA about this.

Anyway I do not have a clear picture of the mechanism used in Rampart in
order to verify that the message send (by a client) is applicable to the
policy defined for the called WS?
Let us suppose we have a WS client. First it retreives the WS' WSDL to get a
notion about the policy to be used. Now let us suppose that this WSDL was
hacked/modified/corrupted somehow and the client is mislead about the policy
to be applied. Now I am expecting that when the SOAP message (created based
on the wrong policy) is send at server side there should be some kind of
Policy verification mechanism that verifies the policy applied is the same
as the policy defined fro the WS. What I saw is that Policy is retrieved
from the MessageContext, but it seems to me that the MessageContext is
provided to the server by the client (, so if the client is "mislead" then
the MessageContext should be wrong, too)? So I am expecting that Rampart
process the SOAP message based on a Policy created at service side not from
client side and it can detect any inconsistencies?

I am sorry if I am asking something totally wrong, but it is very hard to
debug the whole process and I did not succeed to get a clear picture about
this.
I will appreciate any comments/advices on this.

Thank you in advance!

Regards, Dobri

On Sun, Mar 30, 2008 at 10:25 AM, Ruchith Fernando <[EMAIL PROTECTED]>
wrote:

> Hi,
>
> At the moment seems like we do not validate the exact elements that are
> required to be encrypted.
>
> IMHO we will have to improve the
> org.apache.ws.security.processor.ReferenceListProcessor to include the
> decrypted element information (in addition to the ref URI) for rampart
> to be able to validate the encrypted parts correctly.
>
> Thanks Dobri for pointing this out.
>
> Please file an issue here [1].
>
> Thanks,
> Ruchith
>
> 1. https://issues.apache.org/jira/browse/RAMPART
>
> Dobri Kitipov wrote:
> > Hi everybody,
> > currently I am researching how Rampart is validating and verifying  the
> > secured artifacts. Let me give you a sample scenario. Let's say we have
> a WS
> > which policy defines that a specific <sp:EncryptedElements/> should be
> > encrypted (corresponding to a given XPath expression). I am interested
> in
> > understanding the mechanism that is used to verify that the incoming
> message
> > has encrypted exactly that <sp:EncryptedElements/> with the given
> specific
> > XPath expression, but not something else. I suppose rampart is not just
> > counting scheme to ensure that the right number of encrypted/signed
> > parts/elements is reached?
> > I have not finished my research, but I will appreciate any good thoughts
> > and  references related to this topic.
> >
> > Regards, Dobri
> >
>
>
>

Reply via email to