OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

ws-rx message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: RE: [ws-rx] Revised proposal #2 for i122 - i124


I do not agree with this direction. Your proposal does not add anything
that was not already in the previous proposal we made to the TC. All it
does is move the STR from the body to the header. I don't understand
this pursuit to purge RM of primitives from WSS (primitives intended for
such reuse) when no exception is taken to the extensive reuse of
primitives from WS-Addressing. 

This proposal is also inconsistent with the techniques to associate a
specific token with a message described in WS-SecureConversation. You
suggested that referencing such a technique from WS-SecureConversation
rather than defining it from scratch would be preferable:
"It would be much better if this text were to make reference to Section
8 of WS-SC which describes this technique versus inventing it from
Now you highlight as a virtue that RM should do exactly the opposite and
define primitive security patterns that other specifications should

I also do not believe that this proposal is consistent with
SecurityPolicy, see text on point 4 below.

More inline below.

-----Original Message-----
From: Prateek Mishra [mailto:prateek.mishra@oracle.com] 
Sent: Monday, July 10, 2006 12:27 PM
To: Marc Goodner
Cc: ws-rx@lists.oasis-open.org; Gilbert Pilz; Patil, Sanjay
Subject: Re: [ws-rx] Revised proposal #2 for i122 - i124


Attached to this message you will find an alternative solution proposal
that meets the requirements for i122-i124. The proposal is co-authored
by SAP and Oracle. The proposal is expressed as a diff over your
original proposal.

We believe that our proposal has certain advantages over the original
proposal. These include:

(1) Supports a more flexible interaction model (architecture) between RM
and the Security layer; RM layer does not have to process or communicate
security artefacts such as STRs. All required STRs are found within the
SOAP message security header.
MG: Yes but now the security layer has to communicate those artifacts to
the RM layer at the RM layer's request, I fail to see the improvement. I
am not convinced that what you propose is more flexible, it seems to
enforce a rigid implementation strategy on how the security contract
must be shared between the RM and WSS layer that is not described in
your proposal (or WSS). That is in contrast to a well understood
mechanism for just that purpose.

Why is it such a concern to reference WSS elements (esp. ones meant for
reuse) as opposed to reusing WS-A primitives which we do throughout the
RM specification?

What you are proposing has also not been validated by implementation
experience. The approach that we propose has been in a slightly lesser
form in the contributed specs. For anyone who plans to support the
contributed specs your approach therefore represents a complication in
that it requires two implementation approaches rather than one. 

(2) Is based entirely on the OASIS WSS standard.
MG: I don't see that as an advantage if it does not compose with other
specifications such as SecurityPolicy, see below. I think ignoring the
specs in the SX TC is a mistake.

(3) Provides a standard pattern which may be re-used for other
application protocols as it is based upon profiling the STR usage
MG: I do not believe, and you have asserted as well, that RM should not
be defining security patterns for re-use by other applications. The
pattern in our original proposal was described in WS-SecureConversation.
You had previously asked for a reference in the proposal to the
techniques as described there (as noted above). Now you are asserting
that the RM TC should attack a general reusable security pattern for
other applications rather than reusing a common technique described in a
security specification.

(4) Has no additional impact on SecurityPolicy beyond that found in the
original proposal.
MG: I disagree. Your proposal introduces a new STR in the WSS header.
That needs to be described in the SP assertion. Please illustrate how
you would do so, I do not believe there is an existing assertion that
covers this unexpected use. If such an assertion existed in SP, use of
the technique as you have described it would impact the SP layer in that
it would then need to be reflected. Therefore there would be two
assertions, across RM and SP, that would be emitted that are tied
together one not making sense without the other. With our original
proposal the SequenceSTR assertion only indicates the presence of an STR
that will refer to the token to secure the message, nothing more. It
would not affect what the contents of the SP assertion would be. SP
completely defines the token to be referenced.

prateek mishra

> This update is easy to understand but includes some important tweeks 
> that have been discussed on the list. Redlines are from the last 
> revision of this proposal posted on June 21^st .
> http://lists.oasis-open.org/archives/ws-rx/200606/msg00164.html
> First the observation Sanjay made that the header does not make any 
> sense as mU=false has been addressed, the header now must be mU=true.
> http://lists.oasis-open.org/archives/ws-rx/200606/msg00259.html
> I also added a reference to the SC section (I used the contributed 
> version rather than the SX TC editor draft) that describes the use of 
> an STR in a message body to address Prateek's concern that the RX TC 
> not invent new mechanisms. The concern Gil mentioned that there should

> be advice to favor a message independent reference over a local 
> reference has also been added.
> http://lists.oasis-open.org/archives/ws-rx/200607/msg00035.html
> Other than that I corrected a few 2119 terms that were not in caps.
> (Sorry if this is a dupe, I forgot the subject line and the OASIS 
> mailer said it bounced)

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]