OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

ws-rx message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: New proposed issues 8/11 - 8/17


In text format this week due to the html problems on the mail list. Let me know if I missed any. Regards, Marc Goodner

 

Proposed-01: Accurate final acknowledgement of a Sequence with gaps when RMS decides to stop using it.

Proposed-02: Remove dependency on WS-Security

 

--------------------------------------------------------------------------------------------

Proposed-01:

Title: Accurate final acknowledgement of a Sequence with gaps when RMS decides to stop using it.

 

Description: When a Source decides to stop using a sequence, there is no way the RMS can get

a sequence ack that it knows will accurately reflect the final state of the sequence, i.e. the state the sequence will have at actual termination time. No matter how long an RMS waits after its last sending and before requesting its last Ack, some past message that was previously sent and never acknowledged (for which RM Source had stop any resending effort) could be received late by RMD (e.g. after being stuck in a router), i.e. after the sending of the last SequenceAcknowledgement and before the sequence is actually terminated so that the RMD can reclaim resources. This is the twin sister of issue i019 which deals with a similar problem but in case of sequence fault (which gives no chance to RMS to get this final seq ack.)

 

Justification: An RMS (or SA) may decide to stop using a sequence even though some messages were not received (not acked). But in all cases, it is important that the RMS gets a final accurate account of which messages have been received and which have not for this sequence. The RMS may have to raise an error for those not received. Also if the SA decides to take remedial action for these (e.g. some resending on its own) it must be given some means to avoid treating messages that it did not know were already received in a previous sequence (e.g. avoid resending them later in a new sequence as they would become undetectable duplicates.)

 

Target: core

Type: design

Origin: Jacques Durand

Owner: Jacques Durand

 

Proposal: TBD. Outline of a solution:

(a) give an RMS a way to trigger a SeqAck that will be associated with the "closing" of the sequence i.e. no more message will be accepted by the RMD after this Ack is generated.

(b) give an RMS a way to reiterate this trigger in case it is lost, so that it can get this last SeqAck.

 

--------------------------------------------------------------------------------------------

Proposed-02:

Title: Remove dependency on WS-Security

 

Description: The current draft of the WS-ReliableMessaging specification includes elements that are defined in WS-Security. This dependency is unnecessary and creates a number of problems for WS-RM implementations and the organizations that provide such implementations. It should therefore be removed.

 

Justification: Lines 502-508 of WS-ReliableMessaging-v1.0-wd-01 describes the inclusion of a <wsse:SecurityTokenReference> as a sub-element of the <wsrm:CreateSequence> element. The reason for including a SecurityTokenReference in the sequence creation request is to provide the information necessary to perform authorization checks upon the messages within the sequence. Such authorization checks are unnecessary as they only serve to defend against a denial-of-service attack (spoofed sequence identifiers) that can be better defended against by proper protection of the sequence identifier. In addition to this there are a large number of denial of service attacks that are not blocked by these authorization checks.

 

If vendors that provide implementations of WS-RM are required to support the use of the SecurityTokenReference during sequence creation in order to be deemed "compliant" (as the current interopability scenarios indicate), then such vendors must supply an implementation of WS-Security along with their implementation of WS-ReliableMessaging.

This despite the fact that 99% of their customers may not be interested in using anything more complicated than SSL to protect their web services traffic.

 

Although the use of the SecurityTokenReference element is described as optional, the decision on whether or not to use this option lies with the RM Source. Since there is no RM-Policy Assertion that indicates whether or not the RM Destination can accept the use of this option, negotiating the use of this option requires manual, out of band communications between the operators of the two systems. This impacts the usability of the systems that use WS-RM.

 

Target: core

Type: design

Related Issues: i007

Origin: Gilbert Pilz

Owner: Gilbert Pilz

 

Proposal:

* Delete lines 458-461 of WS-ReliableMessaging-v1.0-wd-01

* Delete lines 502-508 of WS-ReliableMessaging-v1.0-wd-01



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]