Jason,

  You rock.  Thanks.  I have a much better understanding now of why it helps
to have this tool in the toolbox.

  - Matt

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:jboss-development-admin@;lists.sourceforge.net]On Behalf Of Jason
Essington
Sent: Thursday, November 14, 2002 12:16 PM
To: [EMAIL PROTECTED]
Subject: Re: [JBoss-dev] jboss.net email transport



On Thursday, November 14, 2002, at 08:55  AM, Matt Munz wrote:

> Jason,
>
>   Well, you've peaked my interest...
>
>> This method(with digital signatures/encryption) would be more secure
>> than the Http(s) transport,
>
> Really?  Any articles on the subject?

Using digital signatures / xml encryption would make the soap message
more secure over any transport

http://www.xml.com/pub/a/2001/08/08/xmldsig.html

Here are two from JavaWorld about Securing web services in general.
http://www.javaworld.com/javaworld/jw-08-2002/jw-0823-securexml.html
http://www.javaworld.com/javaworld/jw-10-2002/jw-1011-securexml.html

And two from developerworks on xml encryption in general
http://www-106.ibm.com/developerworks/library/x-encrypt/index.html
http://www-106.ibm.com/developerworks/library/x-encrypt2/index.html



>> Authentication would be near definite
>> (rather hard to fake),
>
> Is there something in the mail protocol that facilitates this?  I'd
> love to
> see a strong argument for "email is more secure than https"...

Email has really NO good authentication system, so rather than depend
on the smtp (or whatever) protocal for security and authentication, we
use XML-Signature and XML-Encryption
to secure the SOAP message. This method will add additional security to
any transport.
http://www.w3.org/TR/SOAP-dsig/
http://www.w3.org/TR/xmldsig-core/
http://www.w3.org/TR/xmlenc-core/

>
>> the server would not be exposed to the big bad
>> internet,
>
> Hmmm.  Email attacks are fairly common.  Email is, by definition, a
> part of
> the internet.  I'm not sure where you're going with this...

The app server itself would not be exposed, it would still have an
indirect connection via email (mail server), but the email transport
only handles a very small subset of email types and discards the rest.

>
>> and the company's IT guys don't have to set up a VPN to every
>> outside source that needs to update data in the server.
>
> VPNs are bad ;)  What's wrong with the tried and true "poking a hole
> in the
> firewall" technique?  What about https?

Some companies are rather picky about what gets poked through their
firewall, and in some companies certain departments fear the IT group
and would rather not bother them to do such things. This just gives
another option that doesn't require the poking of holes in the firewall.

> Is the idea that "they have to have email anyway, so let's just tunnel
> over
> that"?  Wasn't this same argument used for HTTP tunnelling?

HTTP(S) is nice, and would be completely sufficient if incoming packets
were allowed in every environment, but since there are situations where
this is not possible there is a need for another method. Since the
email transport initiates the transaction (contacts the email server to
collect messages) it is capable of if performing in situations where
http could not. And yes, since the app server already has it's own
email account, this is a ready made path to follow.

I am in no way saying that the http transport is bad, I am just trying
to create an option for situations where http is not feasible.

Email has it's inherent shortcomings that the implementation of
xml-security would help alleviate.

So really what we have here is two-fold, a security infrastructure that
allows soap messages to be digitally signed and possibly encrypted and
an additional transport that depends on that infrastructure to allow
for the secure transmission and authentication of data.

-jason



-------------------------------------------------------
This sf.net email is sponsored by: To learn the basics of securing
your web site with SSL, click here to get a FREE TRIAL of a Thawte
Server Certificate: http://www.gothawte.com/rd524.html
_______________________________________________
Jboss-development mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/jboss-development



-------------------------------------------------------
This sf.net email is sponsored by: To learn the basics of securing 
your web site with SSL, click here to get a FREE TRIAL of a Thawte 
Server Certificate: http://www.gothawte.com/rd524.html
_______________________________________________
Jboss-development mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/jboss-development

Reply via email to