Here it is then: https://issues.apache.org/jira/browse/CXF-4254
Colm. On Fri, Apr 20, 2012 at 1:50 PM, Gary Gregory <ggreg...@rocketsoftware.com> wrote: > On Apr 20, 2012, at 8:39, "Colm O hEigeartaigh" <cohei...@apache.org> wrote: > >>> Regarding the "OnlySignEntireHeadersAndBody property", I don't think that >>> the fact that, the BinarySecurityToken is not included in the response, is >>> only linked to this property. According to me, my interpretation is that it >>> is rather linked to this policy section: >> >> Right. However, if you are signing something it generally *must* be >> included in the request, unless in this case where you are using a >> SecurityTokenReference transform. >> >>> - Could you please give me the JIRA issue number linked to this problem ? >>> - Could you please warn me when you have fixed this issue in order for me >>> to test your modification ? >>> - Should it be fixed in the next release ? which one ? >> >> I didn't create a JIRA, but the fix has been committed and so it >> should appear in the next SNAPSHOTS for 2.4.8-SNAPSHOT, 2.5.4-SNAPSHOT >> or 2.6.1-SNAPSHOT when they get built. > > A Jira would be most helpful to note that a fix was made in this area. > > Gary >> >> Colm. >> >> On Fri, Apr 20, 2012 at 1:10 PM, COURTAULT Francois >> <francois.courta...@gemalto.com> wrote: >>> Hello, >>> >>> "Please take care to reply to the mailing list instead of directly to me." >>> Understood ! >>> >>> Regarding the "OnlySignEntireHeadersAndBody property", I don't think that >>> the fact that, the BinarySecurityToken is not included in the response, is >>> only linked to this property. According to me, my interpretation is that it >>> is rather linked to this policy section: >>> <sp:RecipientToken> >>> <wsp:Policy> >>> <sp:X509Token >>> >>> sp:IncludeToken="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/Never"> >>> <wsp:Policy> >>> <sp:RequireThumbprintReference/> >>> <sp:WssX509V3Token11/> >>> </wsp:Policy> >>> </sp:X509Token> >>> </wsp:Policy> >>> </sp:RecipientToken> >>> >>> Am I wrong ? >>> >>> Anyway: >>> - Could you please give me the JIRA issue number linked to this problem ? >>> - Could you please warn me when you have fixed this issue in order for me >>> to test your modification ? >>> - Should it be fixed in the next release ? which one ? >>> >>> Best Regards. >>> >>> -----Original Message----- >>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>> Sent: vendredi 20 avril 2012 12:27 >>> To: COURTAULT Francois >>> Cc: users@cxf.apache.org >>> Subject: Re: Aware of compatibility issue between CXF and Metro/Weblogic ? >>> >>> Hi Francois, >>> >>> Please take care to reply to the mailing list instead of directly to me. >>> >>> There is a bug in CXF when validating the OnlySignEntireHeadersAndBody >>> property. In this particular response, the SecurityTokenReference Transform >>> is used to dereference a SecurityTokenReference for signature. The result >>> is a BinarySecurityToken that is not included in the message request. CXF >>> always assumes that the signed Element is in the message request, which is >>> not necessarily true. >>> >>> I'll merge a fix for this shortly. In the meantime, you can get around the >>> problem by disabling OnlySignEntireHeadersAndBody, or else stop the server >>> signing the signature key. >>> >>> Colm. >>> >>> On Fri, Apr 20, 2012 at 10:56 AM, COURTAULT Francois >>> <francois.courta...@gemalto.com> wrote: >>>> Hello, >>>> >>>> Attached is the SOAP request and also the Response which causes the error. >>>> >>>> Best Regards. >>>> >>>> -----Original Message----- >>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>> Sent: vendredi 20 avril 2012 10:29 >>>> To: COURTAULT Francois >>>> Cc: users@cxf.apache.org >>>> Subject: Re: Aware of compatibility issue between CXF and Metro/Weblogic ? >>>> >>>> Could you attach the SOAP Message that's causing that error? >>>> >>>> Colm. >>>> >>>> On Thu, Apr 19, 2012 at 4:38 PM, COURTAULT Francois >>>> <francois.courta...@gemalto.com> wrote: >>>>> Hello, >>>>> >>>>> My tests: >>>>> - with no truststore properties in the clientKeystore.properties, >>>>> I got the error: The signature or decryption was invalid >>>>> - with truststore properties in the clientKeystore.properties, I >>>>> got the error: Fault string, and possibly fault code, not set >>>>> Caused by: java.lang.NullPointerException >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.policyvalidators.AbstractBindingPoli >>>>> c >>>>> yValidator.validateEntireHeaderAndBodySignatures(AbstractBindingPolic >>>>> y >>>>> Validator.java:117) >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.policyvalidators.AbstractBindingPoli >>>>> c >>>>> yValidator.checkProperties(AbstractBindingPolicyValidator.java:198) >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.policyvalidators.AsymmetricBindingPo >>>>> l >>>>> icyValidator.validatePolicy(AsymmetricBindingPolicyValidator.java:76) >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JInInterceptor.checkB >>>>> i >>>>> ndingCoverage(PolicyBasedWSS4JInInterceptor.java:669) >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JInInterceptor.doResu >>>>> l >>>>> ts(PolicyBasedWSS4JInInterceptor.java:556) >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage(WSS >>>>> 4 >>>>> JInInterceptor.java:275) >>>>> at >>>>> org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage(WSS >>>>> 4 >>>>> JInInterceptor.java:86) >>>>> at >>>>> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseIntercept >>>>> o >>>>> rChain.java:263) >>>>> at >>>>> org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:799) >>>>> at >>>>> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleR >>>>> e >>>>> sponseInternal(HTTPConduit.java:1635) >>>>> at >>>>> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleR >>>>> e >>>>> sponse(HTTPConduit.java:1502) >>>>> at >>>>> org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(H >>>>> T >>>>> TPConduit.java:1410) >>>>> at >>>>> org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:5 >>>>> 6 >>>>> ) >>>>> at >>>>> org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:650) >>>>> at >>>>> org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndi >>>>> n >>>>> gInterceptor.handleMessage(MessageSenderInterceptor.java:62) >>>>> at >>>>> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseIntercept >>>>> o >>>>> rChain.java:263) >>>>> at >>>>> org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:533) >>>>> at >>>>> org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:463) >>>>> at >>>>> org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:366) >>>>> at >>>>> org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:319) >>>>> at >>>>> org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:88) >>>>> at >>>>> org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:13 >>>>> 4 >>>>> ) >>>>> >>>>> Any idea ? >>>>> >>>>> Best Regards. >>>>> >>>>> -----Original Message----- >>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>> Sent: jeudi 19 avril 2012 15:19 >>>>> To: COURTAULT Francois >>>>> Cc: users@cxf.apache.org >>>>> Subject: Re: Aware of compatibility issue between CXF and Metro/Weblogic ? >>>>> >>>>> If you have access to the CA cert that issues the service provider's >>>>> certificate, then you can put it in a keystore and reference it in the >>>>> client's KeyStore properties file using: >>>>> >>>>> org.apache.ws.security.crypto.merlin.truststore.file= >>>>> org.apache.ws.security.crypto.merlin.truststore.password= >>>>> >>>>> http://ws.apache.org/wss4j/config.html >>>>> >>>>> Colm. >>>>> >>>>> On Thu, Apr 19, 2012 at 9:32 AM, COURTAULT Francois >>>>> <francois.courta...@gemalto.com> wrote: >>>>>> Hello again, >>>>>> >>>>>> Just one remark, before invoking a webservice method, I have those code >>>>>> lines: >>>>>> Map<String, Object> ctx = ((BindingProvider) >>>>>> port).getRequestContext(); >>>>>> ctx.put("ws-security.username", >>>>>> "wssclientcertificate"); >>>>>> ctx.put("ws-security.callback-handler", >>>>>> ClientX509CB.class.getName()); >>>>>> ctx.put("ws-security.signature.properties", >>>>>> "clientKeystore.properties"); >>>>>> >>>>>> And the content of the clientKeystore.properties file is (useful to sign >>>>>> the SOAP request): >>>>>> org.apache.ws.security.crypto.merlin.keystore.file= >>>>>> myClientKeystore.jks >>>>>> org.apache.ws.security.crypto.merlin.keystore.password= >>>>>> myClientKeystorePassword >>>>>> org.apache.ws.security.crypto.merlin.keystore.type=jks >>>>>> org.apache.ws.security.crypto.merlin.keystore.alias= >>>>>> myClientKeystoreAlias >>>>>> >>>>>> The above information is useful to sign the SOAP request but with, the >>>>>> policy used, the response is signed by the server: this why now I didn't >>>>>> get any error from the server but, on the client side, I need to have a >>>>>> configuration which help me to verify the server signature. >>>>>> >>>>>> How can I do that because my code doesn't refer at all to the server >>>>>> certificate which seems, according to me, mandatory in order to be able >>>>>> to perform this server signature verification at the client side ? >>>>>> >>>>>> >>>>>> Best Regards. >>>>>> >>>>>> -----Original Message----- >>>>>> From: COURTAULT Francois >>>>>> Sent: mercredi 18 avril 2012 20:34 >>>>>> To: users@cxf.apache.org >>>>>> Cc: 'cohei...@apache.org' >>>>>> Subject: RE: Aware of compatibility issue between CXF and Metro/Weblogic >>>>>> ? >>>>>> >>>>>> Hello, >>>>>> >>>>>> Just an info: I am not using maven only Eclipse. So I just add >>>>>> slf4j-jdk14-1.6.4.jar in the build path of my eclipse project but again >>>>>> no cxf log :-( I have downloaded the src code of apache cxf 2.5.3 and >>>>>> have a look to the systests folder but I have only found in the >>>>>> systests/ws-security/src/test/resources a sample file logging.properties >>>>>> as a sample. >>>>>> >>>>>> So I have tried to adapt my previous logging config file, >>>>>> cxf-logging.properties with the content: >>>>>> java.util.logging.ConsoleHandler.level = FINEST >>>>>> java.util.logging.ConsoleHandler.formatter = >>>>>> java.util.logging.SimpleFormatter >>>>>> >>>>>> org.apache.cxf.level = FINEST >>>>>> >>>>>> Again no cxf log ??? >>>>>> >>>>>> Really I need some help in order to solve my issue. >>>>>> >>>>>> Best Regards. >>>>>> >>>>>> -----Original Message----- >>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>> Sent: mardi 17 avril 2012 11:26 >>>>>> To: users@cxf.apache.org >>>>>> Subject: Re: Aware of compatibility issue between CXF and Metro/Weblogic >>>>>> ? >>>>>> >>>>>> Try adding in the following dependency: >>>>>> >>>>>> <groupId>org.slf4j</groupId> >>>>>> <artifactId>slf4j-jdk14</artifactId> >>>>>> >>>>>> Failing that take a look at any of the STS systests in CXF to see how >>>>>> logging works there. >>>>>> >>>>>> Colm. >>>>>> >>>>>> On Mon, Apr 16, 2012 at 5:41 PM, COURTAULT Francois >>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>> Hello, >>>>>>> >>>>>>> I have set in my Eclipse environment >>>>>>> with-Djava.util.logging.config.file=D:/Temp/ in the VM arguments. >>>>>>> >>>>>>> Where in the cxf-logging.properties I have: >>>>>>> .level= FINEST >>>>>>> java.util.logging.ConsoleHandler.level = FINEST >>>>>>> >>>>>>> But it doesn't help a lot :-( No cxf dedicated logs appear :-( >>>>>>> >>>>>>> Best Regards. >>>>>>> >>>>>>> -----Original Message----- >>>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>>> Sent: lundi 16 avril 2012 18:24 >>>>>>> To: COURTAULT Francois >>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>> Metro/Weblogic ? >>>>>>> >>>>>>> The best way to find out what's going on is to turn logging up to >>>>>>> FINEST, and see whether it's a problem with trust verification, or >>>>>>> digest comparison. >>>>>>> >>>>>>> Colm. >>>>>>> >>>>>>> On Mon, Apr 16, 2012 at 4:35 PM, COURTAULT Francois >>>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>>> Hello, >>>>>>>> >>>>>>>> I have modified the policy at the server side in order to add a >>>>>>>> signed part (body) in the response. If I dump the exchanges, the >>>>>>>> good news is that now I got no error from the server but I got one >>>>>>>> at the client >>>>>>>> side: seems that the signature coming from the server was invalid >>>>>>>> :-( >>>>>>>> >>>>>>>> My code looks like: >>>>>>>> Map<String, Object> ctx = >>>>>>>> ((BindingProvider) port).getRequestContext(); >>>>>>>> ctx.put("ws-security.username", >>>>>>>> "myClientKeystoreAlias"); >>>>>>>> ctx.put("ws-security.callback-handler", >>>>>>>> ClientX509CB.class.getName()); >>>>>>>> ctx.put("ws-security.signature.properties", >>>>>>>> "clientKeystore.properties"); >>>>>>>> >>>>>>>> where clientKeystore.properties contains: >>>>>>>> >>>>>>>> org.apache.ws.security.crypto.merlin.keystore.file=myClientKeystore. >>>>>>>> j >>>>>>>> k >>>>>>>> s >>>>>>>> >>>>>>>> org.apache.ws.security.crypto.merlin.keystore.password=myClientKey >>>>>>>> s >>>>>>>> t >>>>>>>> o >>>>>>>> r >>>>>>>> ePassword >>>>>>>> org.apache.ws.security.crypto.merlin.keystore.type=jks >>>>>>>> org.apache.ws.security.crypto.merlin.keystore.alias= >>>>>>>> myClientKeystoreAlias >>>>>>>> >>>>>>>> So the clientKeystore is used for signing the SOAP request sent to the >>>>>>>> server but how can the client verify the server signature ? What can I >>>>>>>> do ? What information is missing ? >>>>>>>> >>>>>>>> Best Regards. >>>>>>>> >>>>>>>> -----Original Message----- >>>>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>>>> Sent: vendredi 13 avril 2012 15:01 >>>>>>>> To: COURTAULT Francois >>>>>>>> Cc: users@cxf.apache.org >>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>> Metro/Weblogic ? >>>>>>>> >>>>>>>>> - *if* message level signature is used in the request: how do you >>>>>>>>> know that message level signature is required ? >>>>>>>> >>>>>>>> By the use of a SignedParts or SignedElements policy. >>>>>>>> >>>>>>>>> More generally, in the ws-securitypolicy-1.3-spec-os.pdf document >>>>>>>>> there no real explanation about the meaning of >>>>>>>>> OnlySignEntireHeadersAndBody. So my own interpretation, for this one, >>>>>>>>> is that: >>>>>>>>> - a signature is required for each header blocks and for the >>>>>>>>> body: no need to say more. >>>>>>>> >>>>>>>> That's not my interpretation of the spec. As I said previously, my >>>>>>>> reading is that a signature can't be on a Body or Header child element >>>>>>>> if it exists. I agree that the spec isn't exactly clear though. What's >>>>>>>> the problem with just including a SignedParts policy? >>>>>>>> >>>>>>>> Colm. >>>>>>>> >>>>>>>> On Fri, Apr 13, 2012 at 1:55 PM, COURTAULT Francois >>>>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>>>> Hello, >>>>>>>>> >>>>>>>>> Thanks for your answer. >>>>>>>>> But I still have one question: >>>>>>>>> - *if* message level signature is used in the request: how do you >>>>>>>>> know that message level signature is required ? I was expecting that >>>>>>>>> this is the purpose of the policy you attach to a webservice endpoint >>>>>>>>> and, in my case, OnlySignEntireHeadersAndBody policy means that >>>>>>>>> signature is required at message level. >>>>>>>>> >>>>>>>>> More generally, in the ws-securitypolicy-1.3-spec-os.pdf document >>>>>>>>> there no real explanation about the meaning of >>>>>>>>> OnlySignEntireHeadersAndBody. So my own interpretation, for this one, >>>>>>>>> is that: >>>>>>>>> - a signature is required for each header blocks and for the >>>>>>>>> body: no need to say more. >>>>>>>>> >>>>>>>>> So, just for me to know: where did you find such information with >>>>>>>>> more details regarding OnlySignEntireHeadersAndBody ? >>>>>>>>> >>>>>>>>> Best Regards. >>>>>>>>> >>>>>>>>> -----Original Message----- >>>>>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>>>>> Sent: vendredi 13 avril 2012 12:02 >>>>>>>>> To: COURTAULT Francois >>>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>>> Metro/Weblogic ? >>>>>>>>> >>>>>>>>> Hi Francois, >>>>>>>>> >>>>>>>>> My reading of the spec is that a "OnlySignEntireHeadersAndBody" >>>>>>>>> policy means that *if* message level signature is used in the >>>>>>>>> request, then it must not be a child element of the SOAP Body, or a >>>>>>>>> child element of a particular header, excepting the security header. >>>>>>>>> It does not mandate that signature must be performed, only that if >>>>>>>>> signature is performed it must conform to that policy. Therefore, a >>>>>>>>> SignedParts or SignedElements policy is needed to specify what must >>>>>>>>> actually be signed. >>>>>>>>> >>>>>>>>> Colm. >>>>>>>>> >>>>>>>>> >>>>>>>>> On Thu, Apr 12, 2012 at 11:32 AM, COURTAULT Francois >>>>>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>>>>> Hello, >>>>>>>>>> >>>>>>>>>> I have looked at the security policy spec (1.3) and it seems that >>>>>>>>>> SignedParts is OPTIONAL: right ? >>>>>>>>>> However this spec is not clear at all regarding the relationship >>>>>>>>>> between the <sp:OnlySignEntireHeadersAndBody/> directive and the >>>>>>>>>> <sp:SignedParts/> directive :-( Does the presence of the >>>>>>>>>> <sp:OnlySignEntireHeadersAndBody/> directive requires the >>>>>>>>>> <sp:SignedParts/> directive ? >>>>>>>>>> >>>>>>>>>> Any spec or document which can provide more clear explanation about >>>>>>>>>> the relationship between these 2 above directives ? >>>>>>>>>> So let's suppose that the <sp:OnlySignEntireHeadersAndBody/> could >>>>>>>>>> be used alone, in such case does it mean that all the security >>>>>>>>>> headers and the body have to be signed ? >>>>>>>>>> >>>>>>>>>> Best Regards. >>>>>>>>>> >>>>>>>>>> -----Original Message----- >>>>>>>>>> From: COURTAULT Francois [mailto:francois.courta...@gemalto.com] >>>>>>>>>> Sent: mercredi 11 avril 2012 17:59 >>>>>>>>>> To: cohei...@apache.org >>>>>>>>>> Cc: users@cxf.apache.org >>>>>>>>>> Subject: RE: Aware of compatibility issue between CXF and >>>>>>>>>> Metro/Weblogic ? >>>>>>>>>> Importance: High >>>>>>>>>> >>>>>>>>>> Hello, >>>>>>>>>> >>>>>>>>>> Regarding your last question: Is there such a policy in your WSDL? >>>>>>>>>> I have looked at the policy used (attached) and I only see >>>>>>>>>> <sp:OnlySignEntireHeadersAndBody/> with no SignedParts. >>>>>>>>>> So my question is: with the policy used(attached), is it required or >>>>>>>>>> not to sign the body ? >>>>>>>>>> >>>>>>>>>> A corollary question is, with only the >>>>>>>>>> <sp:OnlySignEntireHeadersAndBody/> directive in the policy, the >>>>>>>>>> webservice endpoint has to accept only SOAP request with at least a >>>>>>>>>> body signature ? >>>>>>>>>> >>>>>>>>>> Best Regards. >>>>>>>>>> >>>>>>>>>> -----Original Message----- >>>>>>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>>>>>> Sent: mercredi 11 avril 2012 17:21 >>>>>>>>>> To: COURTAULT Francois >>>>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>>>> Metro/Weblogic ? >>>>>>>>>> >>>>>>>>>> Hi Francois, >>>>>>>>>> >>>>>>>>>>> - first, for them, in the <dsig:KeyInfo> section, they >>>>>>>>>>> refer the wsse11 namespace which is used in >>>>>>>>>>> wsse11:TokenType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3". >>>>>>>>>>> Is this TokenType mandatory ? >>>>>>>>>> >>>>>>>>>> Not according to my reading of the Basic Security Profile 1.1: >>>>>>>>>> >>>>>>>>>> http://www.ws-i.org/profiles/basicsecurityprofile-1.1.html#x509t >>>>>>>>>> o >>>>>>>>>> k >>>>>>>>>> e >>>>>>>>>> n >>>>>>>>>> t >>>>>>>>>> y >>>>>>>>>> pes >>>>>>>>>> >>>>>>>>>> They give the example: >>>>>>>>>> >>>>>>>>>> CORRECT: >>>>>>>>>> >>>>>>>>>> <wsse:SecurityTokenReference> >>>>>>>>>> <wsse:KeyIdentifier >>>>>>>>>> EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" >>>>>>>>>> >>>>>>>>>> ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentifier" >>>>>>>>>>> >>>>>>>>>> MIGfMa0GCSq >>>>>>>>>> </wsse:KeyIdentifier> >>>>>>>>>> </wsse:SecurityTokenReference> >>>>>>>>>> >>>>>>>>>>> - second, in the <ds:SignedInfo> section, the body signature seems >>>>>>>>>>> missing in the CXF SOAP request. Is it normal ? >>>>>>>>>> >>>>>>>>>> CXF will only sign the SOAP Body if there is a SignedParts policy >>>>>>>>>> that specifies the SOAP Body. Is there such a policy in your WSDL? >>>>>>>>>> >>>>>>>>>> Colm. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Wed, Apr 11, 2012 at 3:56 PM, COURTAULT Francois >>>>>>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>>>>>> Hello again, >>>>>>>>>>> >>>>>>>>>>> I have forwarded your answer to the Oracle support. They replied me >>>>>>>>>>> 2 things: >>>>>>>>>>> - first, for them, in the <dsig:KeyInfo> section, they refer >>>>>>>>>>> the wsse11 namespace which is used in >>>>>>>>>>> wsse11:TokenType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3". >>>>>>>>>>> Is this TokenType mandatory ? >>>>>>>>>>> >>>>>>>>>>> - second, in the <ds:SignedInfo> section, the body signature >>>>>>>>>>> seems missing in the CXF SOAP request. Is it normal ? >>>>>>>>>>> * In Weblogic request: >>>>>>>>>>> <dsig:SignedInfo> >>>>>>>>>>> >>>>>>>>>>> <dsig:CanonicalizationMethod >>>>>>>>>>> >>>>>>>>>>> Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /> >>>>>>>>>>> <dsig:SignatureMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> >>>>>>>>>>> <dsig:Reference >>>>>>>>>>> URI="#Timestamp_WF911A291H4C9EVH"> >>>>>>>>>>> >>>>>>>>>>> <dsig:Transforms> >>>>>>>>>>> >>>>>>>>>>> <dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" >>>>>>>>>>> /> >>>>>>>>>>> >>>>>>>>>>> </dsig:Transforms> >>>>>>>>>>> >>>>>>>>>>> <dsig:DigestMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> >>>>>>>>>>> >>>>>>>>>>> <dsig:DigestValue>FQdxW5uhQYvIlEjZ5eF6FwD0WWM=</dsig:DigestValu >>>>>>>>>>> e >>>>>>>>>>>> >>>>>>>>>>> </dsig:Reference> >>>>>>>>>>> <dsig:Reference >>>>>>>>>>> URI="#Body_6e1VPrhuvqnQBAe6"> >>>>>>>>>>> >>>>>>>>>>> <dsig:Transforms> >>>>>>>>>>> >>>>>>>>>>> <dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" >>>>>>>>>>> /> >>>>>>>>>>> >>>>>>>>>>> </dsig:Transforms> >>>>>>>>>>> >>>>>>>>>>> <dsig:DigestMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> >>>>>>>>>>> >>>>>>>>>>> <dsig:DigestValue>hqQ8dypeB6mi9otTZftZ9wdaIpQ=</dsig:DigestValu >>>>>>>>>>> e >>>>>>>>>>>> >>>>>>>>>>> </dsig:Reference> >>>>>>>>>>> <dsig:Reference >>>>>>>>>>> URI="#bst_156mJ1UUoTA9ZP7b"> >>>>>>>>>>> >>>>>>>>>>> <dsig:Transforms> >>>>>>>>>>> >>>>>>>>>>> <dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" >>>>>>>>>>> /> >>>>>>>>>>> >>>>>>>>>>> </dsig:Transforms> >>>>>>>>>>> >>>>>>>>>>> <dsig:DigestMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> >>>>>>>>>>> >>>>>>>>>>> <dsig:DigestValue>dmD/DqmQIf+LrHjcOgxLKhpCvZE=</dsig:DigestValu >>>>>>>>>>> e >>>>>>>>>>>> >>>>>>>>>>> </dsig:Reference> >>>>>>>>>>> </dsig:SignedInfo> >>>>>>>>>>> >>>>>>>>>>> * In CXF request: >>>>>>>>>>> <ds:SignedInfo> >>>>>>>>>>> >>>>>>>>>>> <ds:CanonicalizationMethod >>>>>>>>>>> >>>>>>>>>>> Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"> >>>>>>>>>>> >>>>>>>>>>> <ec:InclusiveNamespaces >>>>>>>>>>> xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#" >>>>>>>>>>> >>>>>>>>>>> PrefixList="soap"></ec:InclusiveNamespaces> >>>>>>>>>>> >>>>>>>>>>> </ds:CanonicalizationMethod> >>>>>>>>>>> <ds:SignatureMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"></ds:Sig >>>>>>>>>>> n >>>>>>>>>>> a >>>>>>>>>>> t >>>>>>>>>>> u >>>>>>>>>>> r >>>>>>>>>>> e >>>>>>>>>>> M >>>>>>>>>>> ethod> >>>>>>>>>>> <ds:Reference >>>>>>>>>>> URI="#TS-1"> >>>>>>>>>>> <ds:Transforms> >>>>>>>>>>> >>>>>>>>>>> <ds:Transform >>>>>>>>>>> Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"> >>>>>>>>>>> >>>>>>>>>>> <ec:InclusiveNamespaces >>>>>>>>>>> >>>>>>>>>>> xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#" >>>>>>>>>>> PrefixList="wsse soap"></ec:InclusiveNamespaces> >>>>>>>>>>> >>>>>>>>>>> </ds:Transform> >>>>>>>>>>> </ds:Transforms> >>>>>>>>>>> <ds:DigestMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></ds:DigestM >>>>>>>>>>> e >>>>>>>>>>> t >>>>>>>>>>> h >>>>>>>>>>> o >>>>>>>>>>> d >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> <ds:DigestValue>qqnMVp6ogLp4FbJuMaenBdYlm3E=</ds:DigestValue> >>>>>>>>>>> </ds:Reference> >>>>>>>>>>> <ds:Reference >>>>>>>>>>> URI="#X509-A8BAAB773C57F7C94113313097001254"> >>>>>>>>>>> <ds:Transforms> >>>>>>>>>>> >>>>>>>>>>> <ds:Transform >>>>>>>>>>> Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"> >>>>>>>>>>> >>>>>>>>>>> <ec:InclusiveNamespaces >>>>>>>>>>> >>>>>>>>>>> xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#" >>>>>>>>>>> PrefixList="soap"></ec:InclusiveNamespaces> >>>>>>>>>>> >>>>>>>>>>> </ds:Transform> >>>>>>>>>>> </ds:Transforms> >>>>>>>>>>> <ds:DigestMethod >>>>>>>>>>> Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></ds:DigestM >>>>>>>>>>> e >>>>>>>>>>> t >>>>>>>>>>> h >>>>>>>>>>> o >>>>>>>>>>> d >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> <ds:DigestValue>YZ0E9NbYropID0uM5ZQInOgSmYA=</ds:DigestValue> >>>>>>>>>>> </ds:Reference> >>>>>>>>>>> </ds:SignedInfo> >>>>>>>>>>> >>>>>>>>>>> Best Regards. >>>>>>>>>>> >>>>>>>>>>> -----Original Message----- >>>>>>>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>>>>>>> Sent: mardi 10 avril 2012 17:18 >>>>>>>>>>> To: COURTAULT Francois >>>>>>>>>>> Cc: users@cxf.apache.org >>>>>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>>>>> Metro/Weblogic ? >>>>>>>>>>> >>>>>>>>>>>> So according to them, the following namespaces are missing in the >>>>>>>>>>>> CXF request: >>>>>>>>>>>> - wsu >>>>>>>>>>>> - wsse >>>>>>>>>>> >>>>>>>>>>> This is incorrect as both of these namespaces are defined in the >>>>>>>>>>> security header element. >>>>>>>>>>> >>>>>>>>>>> Colm. >>>>>>>>>>> >>>>>>>>>>> On Tue, Apr 10, 2012 at 3:38 PM, COURTAULT Francois >>>>>>>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>>>>>>> Hello, >>>>>>>>>>>> >>>>>>>>>>>> Just to inform you I have also entered an issue in MOS (My Oracle >>>>>>>>>>>> Support). >>>>>>>>>>>> >>>>>>>>>>>> The answer they gave me was that, In the Weblogic client >>>>>>>>>>>> request I had: >>>>>>>>>>>> >>>>>>>>>>>> <dsig:KeyInfo> >>>>>>>>>>>> >>>>>>>>>>>> <wsse:SecurityTokenReference >>>>>>>>>>>> >>>>>>>>>>>> xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" >>>>>>>>>>>> >>>>>>>>>>>> xmlns:wsse11="http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd" >>>>>>>>>>>> >>>>>>>>>>>> xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" >>>>>>>>>>>> >>>>>>>>>>>> wsse11:TokenType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" >>>>>>>>>>>> >>>>>>>>>>>> wsu:Id="str_4RaFdeoK8oynP98t"> >>>>>>>>>>>> >>>>>>>>>>>> <wsse:KeyIdentifier >>>>>>>>>>>> >>>>>>>>>>>> EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" >>>>>>>>>>>> >>>>>>>>>>>> ValueType="http://docs.oasis-open.org/wss/oasis-wss-soap-messa >>>>>>>>>>>> g >>>>>>>>>>>> e >>>>>>>>>>>> - >>>>>>>>>>>> s >>>>>>>>>>>> e >>>>>>>>>>>> c >>>>>>>>>>>> u >>>>>>>>>>>> r >>>>>>>>>>>> ity-1.1#ThumbprintSHA1">tDqtOB05FR2Q/BUdXx1X8rzDXMg=</wsse:Key >>>>>>>>>>>> I >>>>>>>>>>>> d >>>>>>>>>>>> e >>>>>>>>>>>> n >>>>>>>>>>>> t >>>>>>>>>>>> i >>>>>>>>>>>> f >>>>>>>>>>>> i >>>>>>>>>>>> er> >>>>>>>>>>>> >>>>>>>>>>>> </wsse:SecurityTokenReference> >>>>>>>>>>>> </dsig:KeyInfo> >>>>>>>>>>>> >>>>>>>>>>>> Whereas, in the CXF client (CXF 2.5.3 SNAPSHOT), I had: >>>>>>>>>>>> >>>>>>>>>>>> <ds:KeyInfo >>>>>>>>>>>> Id="KI-A8BAAB773C57F7C94113313097001252"> >>>>>>>>>>>> >>>>>>>>>>>> <wsse:SecurityTokenReference >>>>>>>>>>>> wsu:Id="STR-A8BAAB773C57F7C94113313097001253"> >>>>>>>>>>>> >>>>>>>>>>>> <wsse:KeyIdentifier >>>>>>>>>>>> >>>>>>>>>>>> EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" >>>>>>>>>>>> >>>>>>>>>>>> ValueType="http://docs.oasis-open.org/wss/oasis-wss-soap-messa >>>>>>>>>>>> g >>>>>>>>>>>> e >>>>>>>>>>>> - >>>>>>>>>>>> s >>>>>>>>>>>> e >>>>>>>>>>>> c >>>>>>>>>>>> u >>>>>>>>>>>> r >>>>>>>>>>>> ity-1.1#ThumbprintSHA1">tDqtOB05FR2Q/BUdXx1X8rzDXMg=</wsse:Key >>>>>>>>>>>> I >>>>>>>>>>>> d >>>>>>>>>>>> e >>>>>>>>>>>> n >>>>>>>>>>>> t >>>>>>>>>>>> i >>>>>>>>>>>> f >>>>>>>>>>>> i >>>>>>>>>>>> er> >>>>>>>>>>>> >>>>>>>>>>>> </wsse:SecurityTokenReference> >>>>>>>>>>>> </ds:KeyInfo> >>>>>>>>>>>> >>>>>>>>>>>> So according to them, the following namespaces are missing in the >>>>>>>>>>>> CXF request: >>>>>>>>>>>> - wsu >>>>>>>>>>>> - wsse >>>>>>>>>>>> >>>>>>>>>>>> Do you agree ? If yes can we have a fix for that please ? >>>>>>>>>>>> >>>>>>>>>>>> Best Regards. >>>>>>>>>>>> >>>>>>>>>>>> -----Original Message----- >>>>>>>>>>>> From: COURTAULT Francois >>>>>>>>>>>> Sent: vendredi 9 mars 2012 17:36 >>>>>>>>>>>> To: 'cohei...@apache.org' >>>>>>>>>>>> Cc: users@cxf.apache.org >>>>>>>>>>>> Subject: RE: Aware of compatibility issue between CXF and >>>>>>>>>>>> Metro/Weblogic ? >>>>>>>>>>>> >>>>>>>>>>>> Hello, >>>>>>>>>>>> >>>>>>>>>>>> I have picked up the 2.5.3-20120309.061736-28 snapshot. >>>>>>>>>>>> In the SOAP request I saw now, in the SOAP request, the >>>>>>>>>>>> <wsse:KeyIdentifier> section in the <dsig:KeyInfo> >>>>>>>>>>>> <wsse:SecurityTokenReference> section :-) (thanks for this fix) >>>>>>>>>>>> but I still have a SOAP fault in the response coming from Weblogic >>>>>>>>>>>> :-(. >>>>>>>>>>>> >>>>>>>>>>>> Do you have an idea as I haven't so much information (log) on the >>>>>>>>>>>> Weblogic side ? >>>>>>>>>>>> >>>>>>>>>>>> Best Regards. >>>>>>>>>>>> >>>>>>>>>>>> -----Original Message----- >>>>>>>>>>>> From: Daniel Kulp [mailto:dk...@apache.org] >>>>>>>>>>>> Sent: mercredi 7 mars 2012 19:38 >>>>>>>>>>>> To: users@cxf.apache.org >>>>>>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>>>>>> Metro/Weblogic ? >>>>>>>>>>>> >>>>>>>>>>>> On Tuesday, March 06, 2012 06:52:41 PM COURTAULT Francois wrote: >>>>>>>>>>>>> Hello, >>>>>>>>>>>>> >>>>>>>>>>>>> Thanks for the feedback :-) >>>>>>>>>>>>> According to the issue, it should be fixed in the 2.5.3 release: >>>>>>>>>>>>> right ? >>>>>>>>>>>>> When this version will be released ? >>>>>>>>>>>> >>>>>>>>>>>> Likely in a couple weeks. We did a release on Jan 25th and >>>>>>>>>>>> we normally shoot for about every 8 weeks or so. >>>>>>>>>>>> >>>>>>>>>>>> Dan >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> Best Regards. >>>>>>>>>>>>> >>>>>>>>>>>>> -----Original Message----- >>>>>>>>>>>>> From: Colm O hEigeartaigh [mailto:cohei...@apache.org] >>>>>>>>>>>>> Sent: mardi 6 mars 2012 18:36 >>>>>>>>>>>>> To: users@cxf.apache.org >>>>>>>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>>>>>>> Metro/Weblogic ? >>>>>>>>>>>>> >>>>>>>>>>>>> It's an issue in CXF: >>>>>>>>>>>>> >>>>>>>>>>>>> https://issues.apache.org/jira/browse/CXF-4166 >>>>>>>>>>>>> >>>>>>>>>>>>> I'll merge a fix shortly. >>>>>>>>>>>>> >>>>>>>>>>>>> Colm. >>>>>>>>>>>>> >>>>>>>>>>>>> On Tue, Mar 6, 2012 at 3:13 PM, COURTAULT Francois >>>>>>>>>>>> <francois.courta...@gemalto.com> wrote: >>>>>>>>>>>>>> Hello Glen, >>>>>>>>>>>>>> >>>>>>>>>>>>>> The two issues (WSIT-1490 and WSIT-1590) you mention seem >>>>>>>>>>>>>> not related to the issue I have got :-( I am not using STS >>>>>>>>>>>>>> (WS-Trust) at all: >>>>>>>>>>>>>> - WSIT-1490: no SAML used in the KeyIdentifier with >>>>>>>>>>>>>> a #uuid in the SOAP request. - WSIT-1590: no encoded email in >>>>>>>>>>>>>> the SOAP request. >>>>>>>>>>>>>> >>>>>>>>>>>>>> Best Regards. >>>>>>>>>>>>>> >>>>>>>>>>>>>> -----Original Message----- >>>>>>>>>>>>>> From: Glen Mazza [mailto:gma...@talend.com] >>>>>>>>>>>>>> Sent: mardi 6 mars 2012 15:20 >>>>>>>>>>>>>> To: users@cxf.apache.org >>>>>>>>>>>>>> Subject: Re: Aware of compatibility issue between CXF and >>>>>>>>>>>>>> Metro/Weblogic ? >>>>>>>>>>>>>> >>>>>>>>>>>>>> There's a couple of problems that seem to be on Metro's >>>>>>>>>>>>>> side (http://java.net/jira/browse/WSIT-1490, >>>>>>>>>>>>>> http://java.net/jira/browse/WSIT-1590) affecting >>>>>>>>>>>>>> interoperability between the two stacks. It would be great >>>>>>>>>>>>>> if these were fixed, as both Metro and CXF are better off >>>>>>>>>>>>>> the more interoperable they are with each other. Feel free >>>>>>>>>>>>>> to vote for these two issues. :) >>>>>>>>>>>>>> >>>>>>>>>>>>>> Glen >>>>>>>>>>>>>> >>>>>>>>>>>>>> On 03/06/2012 07:03 AM, COURTAULT Francois wrote: >>>>>>>>>>>>>>> Hello, >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> I have tried to write a CXF client which talks to a WSS >>>>>>>>>>>>>>> protected >>>>>>>>>>>>>>> (X509Token) webservice hosted in Weblogic (Metro based) >>>>>>>>>>>>>>> but unfortunately I got a Soap fault error. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> If I compare a soap request which works and the one >>>>>>>>>>>>>>> generated by CXF, the only difference I have seen is that >>>>>>>>>>>>>>> in the<dsig:KeyInfo> <wsse:SecurityTokenReference> >>>>>>>>>>>>>>> section, I have a<wsse:KeyIdentifier> section in the one >>>>>>>>>>>>>>> which succeeded whereas I haven't this section in the CXF one. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Any advice ? Any idea ? >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Best Regards. >>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> Glen Mazza >>>>>>>>>>>>>> Talend Community Coders - coders.talend.com >>>>>>>>>>>>>> blog: www.jroller.com/gmazza >>>>>>>>>>>>> >>>>>>>>>>>>> -- >>>>>>>>>>>>> Colm O hEigeartaigh >>>>>>>>>>>>> >>>>>>>>>>>>> Talend Community Coder >>>>>>>>>>>>> http://coders.talend.com >>>>>>>>>>>> -- >>>>>>>>>>>> Daniel Kulp >>>>>>>>>>>> dk...@apache.org - http://dankulp.com/blog Talend Community >>>>>>>>>>>> Coder >>>>>>>>>>>> - http://coders.talend.com >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>>> Colm O hEigeartaigh >>>>>>>>>>> >>>>>>>>>>> Talend Community Coder >>>>>>>>>>> http://coders.talend.com >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> Colm O hEigeartaigh >>>>>>>>>> >>>>>>>>>> Talend Community Coder >>>>>>>>>> http://coders.talend.com >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> Colm O hEigeartaigh >>>>>>>>> >>>>>>>>> Talend Community Coder >>>>>>>>> http://coders.talend.com >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> -- >>>>>>>> Colm O hEigeartaigh >>>>>>>> >>>>>>>> Talend Community Coder >>>>>>>> http://coders.talend.com >>>>>>> >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> Colm O hEigeartaigh >>>>>>> >>>>>>> Talend Community Coder >>>>>>> http://coders.talend.com >>>>>> >>>>>> >>>>>> >>>>>> -- >>>>>> Colm O hEigeartaigh >>>>>> >>>>>> Talend Community Coder >>>>>> http://coders.talend.com >>>>> >>>>> >>>>> >>>>> -- >>>>> Colm O hEigeartaigh >>>>> >>>>> Talend Community Coder >>>>> http://coders.talend.com >>>> >>>> >>>> >>>> -- >>>> Colm O hEigeartaigh >>>> >>>> Talend Community Coder >>>> http://coders.talend.com >>> >>> >>> >>> -- >>> Colm O hEigeartaigh >>> >>> Talend Community Coder >>> http://coders.talend.com >> >> >> >> -- >> Colm O hEigeartaigh >> >> Talend Community Coder >> http://coders.talend.com -- Colm O hEigeartaigh Talend Community Coder http://coders.talend.com