Hi,

> Yes I have the IssuedToken policy on the WSP (not shown). The below
> policies are on my STS service. The question was in regards to connecting to
> the STS service to have a token issued (or renewed, or validated). I
> authenticate using the SignedEncryptedSupportingTokens UsernameToken.
> What I'm trying to figure out is how the key generated by the client for
> symmetric binding is exchanged with the STS service so that it can sign/verify
> encrypt/decrypt messages with the client.

Ok, I get it now. I think Colm already answered your question.
Btw: is there special reasons to use symmetric, not transport binding for 
communication with STS in your case?

Regards,
Andrei.

> -----Original Message-----
> From: Josh Hill [mailto:[email protected]]
> Sent: Sonntag, 5. Mai 2013 21:56
> To: [email protected]; [email protected]
> Subject: RE: SymmetricBinding key exchange and signing
> 
> Andrei,
> 
> Yes I have the IssuedToken policy on the WSP (not shown). The below
> policies are on my STS service. The question was in regards to connecting to
> the STS service to have a token issued (or renewed, or validated). I
> authenticate using the SignedEncryptedSupportingTokens UsernameToken.
> What I'm trying to figure out is how the key generated by the client for
> symmetric binding is exchanged with the STS service so that it can sign/verify
> encrypt/decrypt messages with the client.
> 
> 
> Colm,
> 
> Is there not some exchange of the generated key between the client and
> STS? If the client signs (and encrypts) the request how does the STS have the
> generated key to verify signature and decrypt? My original question
> suggested that it is exchanged by encrypting it with the STS public key but
> not sure how it is signed in this exchange. Perhaps the exchange of the
> generated key isn't signed?
> 
> I appreciate your time.
> 
> Josh
> 
> >
> 
> Josh Hill
> Senior Java Developer
> 
> 
> sovereign finance and banking software
> 
> A Level 1, Building C, Millennium Centre, 602 Great South Road, Greenlane,
> Auckland, New Zealand
> D 64 9 571 6812     P 64 9 571 6800   F 64 9 571 6899
> E [email protected]   W http://www.finzsoft.com
> 
> Please note: This email contains information that is confidential and may be
> privileged. If you are not the intended recipient, you must not peruse, use,
> disseminate, distribute or copy this email or attachments. If you have
> received this in error, please notify Finzsoft Solutions (New Zealand) Ltd
> immediately by return email and delete this email. Thank you.
> -----Original Message-----
> 
> > From: Colm O hEigeartaigh [mailto:[email protected]]
> > Sent: Saturday, 4 May 2013 12:36 a.m.
> > To: [email protected]
> > Subject: Re: SymmetricBinding key exchange and signing
> >
> > The Symmetric key that the client generates signs (and encrypts) the
> > request (SOAP Body). There is no need for a signing certificate as you
> > are using the Symmetric binding. Authentication is enforced via the
> > UsernameToken SupportingToken.
> >
> > Colm.
> >
> >
> > On Fri, May 3, 2013 at 4:25 AM, Josh Hill <[email protected]> wrote:
> >
> > >  My understanding is that the client generates the symmetric key (as
> > > defined by the sp:ProtectionToken i.e. a sp:X509Token) and encrypts
> > > it using the STS's public key (configured on client using
> > > "ws-security.encryption.properties\username"). When sending this
> > > encrypted key to the STS what is it signed with? I haven't set the
> > > "ws-security.signature.properties\username" on my client but the
> > > input policy on the STS requires the sp:Body be signed. ****
> > >
> > > ** **
> > >
> > > ...****
> > >
> > > <entry key="ws-security.sts.client">****
> > >
> > >                 <bean
> > > class="org.apache.cxf.ws.security.trust.STSClient">*
> > > ***
> > >
> > >                                 <constructor-arg ref="cxf" />****
> > >
> > >                                 <property name="wsdlLocation" value="
> > > http://localhost:8080/STS?wsdl"; />****
> > >
> > >                                 <property name="serviceName"
> > > value="{
> > > http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenServi
> > > ce
> > > " />
> > > ****
> > >
> > >                                 <property name="endpointName"
> > > value="{ http://docs.oasis-open.org/ws-sx/ws-trust/200512/}STS_Port";
> > > />****
> > >
> > >                                 <property name="properties">****
> > >
> > >                                                 <map>****
> > >
> > >
> > > <entry key="ws-security.username" value="bob" />****
> > >
> > >
> > > <entry key="ws-security.callback-handler" value="ClientCallbackHandler"
> > > />****
> > >
> > >
> > > <entry key="ws-security.encryption.properties"
> > > value="clientKeystore.properties" />
> > > ****
> > >
> > >
> > > <entry key="ws-security.encryption.username" value="stskey" />****
> > >
> > >                                                 </map>****
> > >
> > >                                 </property>****
> > >
> > >                 </bean>****
> > >
> > > </entry>****
> > >
> > > .****
> > >
> > > ** **
> > >
> > > <wsp:Policy wsu:Id="STS-UT-Policy">****
> > >
> > >                 <wsp:ExactlyOne>****
> > >
> > >                                 <wsp:All>****
> > >
> > >
> > > <sp:SymmetricBinding>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:ProtectionToken>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:X509Token sp:IncludeToken="
> > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeTok
> > > en
> > > /Never
> > > ">****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:RequireDerivedKeys/>****
> > >
> > >
> > > <sp:RequireThumbprintReference/>****
> > >
> > >
> > > <sp:WssX509V3Token10/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:X509Token>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:ProtectionToken>****
> > >
> > >
> > > <sp:AlgorithmSuite>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:Basic256/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:AlgorithmSuite>****
> > >
> > >
> > > <sp:Layout>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:Lax/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:Layout>****
> > >
> > >
> > > <sp:IncludeTimestamp/>****
> > >
> > >
> > > <sp:EncryptSignature/>****
> > >
> > >
> > > <sp:OnlySignEntireHeadersAndBody/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:SymmetricBinding>****
> > >
> > >
> > > <sp:SignedEncryptedSupportingTokens>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:UsernameToken sp:IncludeToken="
> > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeTok
> > > en
> > > /AlwaysToRecipient
> > > ">****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:HashPassword/>****
> > >
> > >
> > > <sp:WssUsernameToken10/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:UsernameToken>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >
> > > </sp:SignedEncryptedSupportingTokens>****
> > >
> > >                                                 <sp:Wss11>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:MustSupportRefKeyIdentifier/>****
> > >
> > >
> > > <sp:MustSupportRefIssuerSerial/>****
> > >
> > >
> > > <sp:MustSupportRefThumbprint/>****
> > >
> > >
> > > <sp:MustSupportRefEncryptedKey/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >                                                 </sp:Wss11>****
> > >
> > >                                                 <sp:Trust13>****
> > >
> > >
> > > <wsp:Policy>****
> > >
> > >
> > > <sp:MustSupportIssuedTokens/>****
> > >
> > >
> > > <sp:RequireClientEntropy/>****
> > >
> > >
> > > <sp:RequireServerEntropy/>****
> > >
> > >
> > > </wsp:Policy>****
> > >
> > >                                                 </sp:Trust13>****
> > >
> > >                                 </wsp:All>****
> > >
> > >                 </wsp:ExactlyOne>****
> > >
> > > </wsp:Policy>****
> > >
> > > ** **
> > >
> > > <wsp:Policy wsu:Id="STS-Input-Policy">****
> > >
> > >                 <wsp:ExactlyOne>****
> > >
> > >                                 <wsp:All>****
> > >
> > >                                                 <sp:SignedParts>****
> > >
> > >
> > > <sp:Body/>
> > > ****
> > >
> > >
> > > </sp:SignedParts>****
> > >
> > >
> > > <sp:EncryptedParts>****
> > >
> > >
> > > <sp:Body/>
> > > ****
> > >
> > >
> > > </sp:EncryptedParts>****
> > >
> > >                                 </wsp:All>****
> > >
> > >                 </wsp:ExactlyOne>****
> > >
> > > </wsp:Policy>****
> > >
> > > ** **
> > >
> > > <wsp:Policy wsu:Id="STS-Output-Policy">****
> > >
> > >                 <wsp:ExactlyOne>****
> > >
> > >                                 <wsp:All>****
> > >
> > >                                                 <sp:SignedParts>****
> > >
> > >
> > > <sp:Body/>
> > > ****
> > >
> > >
> > > </sp:SignedParts>****
> > >
> > >
> > > <sp:EncryptedParts>****
> > >
> > >
> > > <sp:Body/>
> > > ****
> > >
> > >
> > > </sp:EncryptedParts>****
> > >
> > >                                 </wsp:All>****
> > >
> > >                 </wsp:ExactlyOne>****
> > >
> > > </wsp:Policy>****
> > >
> > >
> > >
> > > *Josh Hill*
> > > Senior Java Developer
> > >
> > >
> > >
> > > [image: Finzsoft - Your Vision + Our Innovations]
> > >
> > >
> > >
> > > sovereign finance and banking software
> > >
> > >
> > >
> > > *A* Level 1, Building C, Millennium Centre, 602 Great South Road,
> > > Greenlane, Auckland, New Zealand
> > > *D* 64 9 571 6812       *P* 64 9 571 6800    *F* 64 9 571 6899
> > > *E* [email protected]    *W* www.finzsoft.com
> > >
> > >
> > >       *Please note*: This email contains information that is
> > > confidential and may be privileged. If you are not the intended
> > > recipient, you must not peruse, use, disseminate, distribute or copy
> > > this
> > email or attachments.
> > > If you have received this in error, please notify Finzsoft Solutions
> > > (New
> > > Zealand) Ltd immediately by return email and delete this email. Thank
> you.
> > >
> > >
> > >
> >
> __________________________________________________________
> > ____________
> > > This email has been scanned by the Symantec Email Security.cloud
> service.
> > >
> >
> __________________________________________________________
> > ____________
> > >
> >
> >
> >
> > --
> > Colm O hEigeartaigh
> >
> > Talend Community Coder
> > http://coders.talend.com
> >
> >
> __________________________________________________________
> > ____________
> > This email has been scanned by the Symantec Email Security.cloud service.
> >
> __________________________________________________________
> > ____________
> 
> __________________________________________________________
> ____________
> This email has been scanned by the Symantec Email Security.cloud service.
> __________________________________________________________
> ____________

Reply via email to