Surely it's better to say "if you have this bug then download a version of Xerces greater than x.x" rather than "fixing" a bug in someone else's code with a hack in yours? That's just asking for maintenance headaches isn't it?
-----Original Message----- From: Davanum Srinivas [mailto:[EMAIL PROTECTED] Sent: 03 February 2004 15:11 To: [EMAIL PROTECTED] Subject: Re: AW: AW: AW: Verification after decrypt Werner, We can't depend on a specific version of Xerces EVEN if they fix problems in their code. So is there a possibility of patching xml-security itself? (Write custom serializers just like we do in Axis) thanks, dims --- Dittmann Werner <[EMAIL PROTECTED]> wrote: > Berin, > > AFAIK Dims wrote an e-mail to somebody of the > Xerces group and asked if they would fix the problem. > Don't know about the outcome. > > After all, the Xerces guys are heavily working > on the serialization matter. But i'm not > aware if they fix it soon. > > BTW, the Xerces Bugzilla # 25853 describes the > problem, also attached a fix. > > Would be nice if we had the problem solved, then > we could enable the bug fix of the encryption code. > > Regards, > Werner > > > -----Ursprüngliche Nachricht----- > > Von: Berin Lautenbach [mailto:[EMAIL PROTECTED] > > Gesendet: Dienstag, 3. Februar 2004 12:30 > > An: [EMAIL PROTECTED] > > Betreff: Re: AW: AW: Verification after decrypt > > > > > > Ahh. Yes. Apologies - had forgotten the part about the bug! > > > > What think you - should we see if we can escalate with the Xerces > > people? Am happy to do so! > > > > Cheers, > > Berin > > > > > > Dittmann Werner wrote: > > > > > Berin, > > > > > > actually there were (are) some problems during > > > the encryption processing in Content mode, in particular > > > the serialization of Document fragments (Document > > > fragments may have Text nodes as first level > > > child nodes - its a fragment). > > > > > > The first problems was that Content mode didn't > > > serialize the whole Document fragment, it serialized > > > Element nodes _only_. > > > > > > Because of this problem the encryption effectivley > > > changed the contents of the data to encrypt, e.g. by > > > not serializing first level Text nodes. These non-Element > > > nodes were just ignored. If you signed the data before > > > encryption then you couldn't verfiy the data after > > > decryption > > > > > > To make it work for SOAP requests we fixed that problem > > > (quick fix that serializes Element nodes and Text nodes, > > > but not any other node types). That works ok for SOAP > > > (they usually don't have any CDATA or Comment nodes :-) ). > > > > > > For the encryption of generic XML Document in content > > > mode the whole Document fragment shall correctly > > > serialized. > > > > > > (IMO, encryption shall _never_ modify its input data, it > > > shall take it literally (as far as possible) and encrypt > > > it.) > > > > > > To do this I tried the Xerces serialization. During the > > > tests I discovered a problem in Xerces serialization too > > > (it didn't handle Document Fragment correctly, chokes on > > > CDATA and Comments at least, didn't check PI nodes). > > > > > > The proposed bug fix was not yet included in Xerces code > > > (checked yesterday in commit e-mail archive). Thus we > > > can't enable the according fix in xml-sec (mailed some > > > time ago). > > > > > > Regards, > > > Werner > > > > > > > > > > > >>-----Ursprüngliche Nachricht----- > > >>Von: Berin Lautenbach [mailto:[EMAIL PROTECTED] > > >>Gesendet: Montag, 2. Februar 2004 23:03 > > >>An: [EMAIL PROTECTED] > > >>Betreff: Re: AW: Verification after decrypt > > >> > > >> > > >>Werner, > > >> > > >>I thought the problems were around CDATA and handling thereof when > > >>decrypting and moving the decrypted byes back to DOM. > > >>I *think* (although I may well have forgotten something vital > > >>:>) that the > > >>canonicalisation that happens during signature verification > > >>should bypass > > >>all of this. (CDATA gets "transformed" to straight text in > > >>any case at > > >>this point.) > > >>Cheers, > > >> Berin > > >> > > >> > > >>>Heyjung > > >>> > > >>>as I understand it you first sign, then encrypt your XML document > > >>>(decrypt/verify to check it). > > >>> > > >>>Depending on the xmlsec-jar you use there may be problems in the > > >>>encryption mehtods. > > >>> > > >>>The problem in some case (note: XML encryption is in beta) > > >> > > >>is that the > > >> > > >>>encryption _may_ change contents of your XML data you just > > >>>signed. This breaks the signature. This happens e.g. if you use > > >>>Content mode as opposed to Element mode, also if your XML > > >>>contains CDATA or comments it may break. > > >>> > > >>>Please refer to some mails about this in the mail archive > > >> > > >>(December and > > >> > > >>>January). There was a fix for one particular problem but not as a > > >>>overall solution. > > >>> > > >>>Regards, > > >>>Werner > > >>> > > >>>-----Ursprüngliche Nachricht----- > > >>>Von: Hye-Jung Kim [mailto:[EMAIL PROTECTED] > > >>>Gesendet: Montag, 2. Februar 2004 00:51 > > >>>An: [EMAIL PROTECTED] > > >>>Betreff: Verification after decrypt > > >>> > > >>> > > >>>Hello, > > >>>I am trying to decrypt and verify data( signed & encrypted > > >> > > >>) using the > > >> > > >>>XML security suite and the > > >> > > >>signature.checkSignatureValue(cert) returns > > >> > > >>>false which means the signature varification has failed. I > > >> > > >>am not sure > > >> > > >>>why it failed since verification for signed only data and > > >> > > >>decrypt for > > >> > > >>>encrypted only data work fine. Can I simply decrypt the signed & > > >>>encrypted data first then pass it to my verifier to create > > >> > > >>XMLSignature > > >> > > >>>to call checkSignatureValue ? Please advise! Thanks in advance. > > >>> > > >>>Hyejung > > >>> > > >>> > > >>> > > >>> > > >>> > > >>> > > >>> > > >>> > > >> > > >> > > >> > > > > > > > > ===== Davanum Srinivas - http://webservices.apache.org/~dims/