Jason Pell wrote
> As an aside having a timestamp and nonce with a username password does
> notprevent replay attacks. Because attacker has all info to replay they
> justneed to generate new timestamp and nonce and use existing
> password.From what I read digest passwords are actually encoded with the
> nonce valueso there is no way to reproduce the password as its one way.On
> 13/10/2014 8:08 PM, "Chris" <

> [email protected]

> > wrote:

That's not the case with Oracle (or indeed CXF) servers. When you have a
nonce and a timestamp the system will prevent the same nonec being used
until the timestamp expires. See  Web Services Security 3 UsernameToken
Profile 1.0
<http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0.pdf>
 
:/103 Two optional elements are introduced in the  element to provide a 104
countermeasure for replay attacks:  and . A nonce is a 105 random value that
the sender creates to include in each UsernameToken that it sends. Although
106 using a nonce is an effective countermeasure against replay attacks, it
requires a server to 107 maintain a cache of used nonces, consuming server
resources. Combining a nonce with a 108 creation timestamp has the advantage
of allowing a server to limit the cache of nonces to a 109 "freshness" time
period, establishing an upper bound on resource requirements. If either or
both 110 of  and  are present they MUST be included in the digest value 111
as follows:  /



--
View this message in context: 
http://cxf.547215.n5.nabble.com/CXF-client-send-nonce-and-timestamp-tp5749743p5749843.html
Sent from the cxf-user mailing list archive at Nabble.com.

Reply via email to