[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

RE: SOAP-RPC and REST and security


easy indirection for making soap
> From: Paul Prescod [mailto:paul@p...]

<snip/>

> It's radically different because there is no easy way to 
> build a bridge
> from form posts to arbitrary COM objects, is there? It takes 
> effort. It
> takes mediation. The extra effort introduces a layer of indirection
> which makes security holes less likely.

Well, you are right that there are no wizards (AFAIK) to expose a COM
interface via a form post. But writing an ASP page to do so is actually
quicker an easier than those hyped wizards for exposing a COM interface.
(And as an aside, I totally agree that designing a web service by
mechanically exposing an implemenation is a bad approach. James Snell has a
nice little article on xml.com that points to the pitfalls with this
approach [1] with regard to interoperability. This approach is not likely to
be sustainable, although he doesn't seem to draw that conclusion.)

<snip/>

> Think about it...all of the infrastructure software companies in the
> world are working together to sell FIREWALL SUBVERSION TECHNOLOGY. And
> they advertise it as such. Doesn't that seem a little strange 
> to you??? 

OK. I see your point. But I would still say a couple of things about this. 

Making it "easy" to get through the firewall is not the same as
"subversion". The SOAP spec even offers a header explicitly for filtering at
the protocol layer: the SOAPAction header. I understand that in practice,
use of this header is rather uneven. But it seems to have been an explicit
attempt by the spec writers to provide visibility to the firewall, among
other things. I'd be interested in your opinion on this. Would it help if
implementations treated the SOAPAction header more seriously, or was that
proposal a misfire to begin with?

The fact that tools by certain vendors promote questionable approaches is
not the same as the standard itself being flawed. Rather than fixating on
Microsoft's tools, I'd rather hear analysis focusing on the spec itself.
Remember, this is the vendor that told us customers *want* to get emails
that can run code on their systems. Does that mean email itself is
inherently insecure? I don't see one vendors tools or marketing hype as an
indictment of SOAP itself.

It seems like several issues are getting muddled. But I will confess that
the thought of newbie programmers picking up those Visual Studio wizards and
exposing web services scares me, too. I think drawing clearer delineations
between implementations and the spec itself would help the credibility of
analyses.

BTW, you must be getting tired by now, Paul.  ;-) I appreciate you comments,
though. This has been quite a debate.

[1] http://www.xml.com/pub/a/2002/01/30/soap.html

PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.