Thanks for all the replies so far! I would just like to comment on 
Holger Peine's and Mike Hines' viewpoints.

[EMAIL PROTECTED] wrote:
> I don't see a conflict here: A web service (just as any
> network-accessible
> service, no matter whether programmed using sockets, Java RMI, SOAP or
> whatever) is _intended_ to provide some function to the outside world,
> so you have to open _some_ door into your system. The advice about
> minimizing the attack surface is about not opening any doors you don't
> really need (or worse, didn't even intend to open).

As you say, any kind of system is _intended_ to provide some function. 
But security bugs often hide in unintended, undocumented or unknown 
functionality. By increasing the attack surface you also increase the 
risk of adding unknown functions.

Mike Hines commented on web services running everything through port 80 
(HTTP) as negating "... any value of firewalls and most likely intrusion 
detection systems". Indeed, web services tunnel a lot of functionality 
through port 80, effectively hiding it from many system monitoring 
defense measures. The security will rely on validating SOAP envelopes 
and prevention at the application/run-time system level. It seems to me 
like a huge burden.

    Regards, John

____________________________
John Wilander, PhD student
Computer and Information Sc.
Linkoping University, Sweden
http://www.ida.liu.se/~johwi
_______________________________________________
Secure Coding mailing list (SC-L)
[email protected]
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to