This is an archived snapshot of W3C's public bugzilla bug tracker, decommissioned in April 2019. Please see the home page for more details.

Bug 9569 - Transfer: "Security Considerations" sections vague and misleading
Summary: Transfer: "Security Considerations" sections vague and misleading
Status: CLOSED REMIND
Alias: None
Product: WS-Resource Access
Classification: Unclassified
Component: Transfer (show other bugs)
Version: LC
Hardware: PC All
: P2 normal
Target Milestone: ---
Assignee: Gilbert Pilz
QA Contact: notifications mailing list for WS Resource Access
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-04-21 12:25 UTC by Robert Freund
Modified: 2010-07-28 09:12 UTC (History)
1 user (show)

See Also:


Attachments
proposal 1 to replace Section 7 of the WS-Transfer spec (66.73 KB, application/x-zip-compressed)
2010-05-07 21:41 UTC, Gilbert Pilz
Details

Description Robert Freund 2010-04-21 12:25:55 UTC
WS-Eventing, WS-Transfer, WS-MetadataExchange, and WS-Enumeration each contain
a "Security Considerations" section. These sections contain various bits of
"pious advice" that have no normative value and little to do with the protocols
to which they apply. If you understand the basics of web services security,
these sections won't teach you anything new and don't provide any insight into
the particular problems of securing their corresponding protocols. For example,
the Security Considerations section of WS-Eventing says nothing about making
sure that the sender of a Renew, GetStatus, or Unsubscribe request is the same
entity as the sender of the Subscribe request that created the subscription
that is being acted upon.

Proposal 1: remove the "Security Considerations" sections from WS-Eventing,
WS-Transfer, WS-MetadataExchange, and WS-Enumeration.

Proposal 2: rewrite the "Security Considerations" sections from WS-Eventing,
WS-Transfer, WS-MetadataExchange, and WS-Enumeration along the following
guidelines:

1. Identify the specific resources that need to be protected (e.g.
subscriptions, enumeration contexts, etc.)

2. Describe common methods for protecting these resources including, but not
limited to, the use of WS-Security and related technologies. Relate these
methods to the protocol in question.

3. Identify any special challenges posed to (2) due to the nature of the
protocols, etc.
Comment 1 Gilbert Pilz 2010-05-07 21:41:13 UTC
Created attachment 871 [details]
proposal 1 to replace Section 7 of the WS-Transfer spec
Comment 2 Robert Freund 2010-05-11 18:19:55 UTC
resolved with proposal 1