[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message] Re: Malicious documents? (WAS: Interesting mailing list & a ra
Jim Ancona wrote, > --- Miles Sabin <miles@m...> wrote: > > Interestingly, the RESTian push for GET over POST for web services > > is likely to make exploits of this sort easier. That's not a > > criticism of REST per se, but it suggests that RESTians probably > > have a duty to think about the security implications of GET vs > > POST. > > The HTTP spec describes some of the security implications of method > selection.[1][2] No REST advocate I've encountered has advocated > using GET for actions that are not safe. What sort of additional > implications were you thinking about? The implications of web services as they actually are/will be deployed as opposed to how they _ought_ to be deployed. No matter what RFC 2616 says, unsafe actions will (continue to) be made available via GET. This is particularly likely in (thought to be) closed and controlled environments, eg. the internal network in the firewall penetration scenario I described earlier. GET based services are the ones which would be most vulnerable to the external entity tricks discussed, because it's easier to trick an application into issuing a meaningful GET than a meaningful POST. It's tempting to say that people who don't follow the rules get what they deserve, but that ignores the fact that compromised systems can hurt innocent third parties. Nb. I'm not arguing that the GET based SOAP binding is a Bad Thing, merely that it needs to be emphasized that GET based services might need to be secured more carefully that POST based ones. Cheers, Miles
|
PURCHASE STYLUS STUDIO ONLINE TODAY!Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Download The World's Best XML IDE!Accelerate XML development with our award-winning XML IDE - Download a free trial today! Subscribe in XML format
|