Web Services Secure But Flawed

LAS VEGAS — Web Services are growing as the solution for creating a more
connected and extensible enterprise, but its W3C XML security specification isn’t so secure.

ISecpartners researcher Brad Hill spent about an hour at the Black Hat show here making his case against the WS-Security stack and how it could be compromised by an attacker.

The solution to the problem identified by Hill may be in how WS-Security is
configured. The solution could be to fall back on the established SSL
(define) mechanisms of ensuring secured transport.

“SSL is getting an anti-cult following, and some argue that it’s not right
for the Web Services world,” Hill told the Black Hat audience. “I disagree.
SSL does almost everything you need for real-world Web service deployment.”

He added that there is a lot of complexity in dealing with what he thinks
are immature WS-Security standards.

For one, the attack surface of WS-Security is much bigger than that of SSL.
With message-oriented security, Hill said, you need to have messages
before you can do anything. That’s not the case with SSL, where the
attacker gets less to play with.

Hill referred to the WS-Security stack as a target-rich environment that is
open for attack. In contrast, SSL with client certificates keeps users out of the message stack unless authenticated.

In Hill’s assessment, WS-Security is not ready to use out of
the box like SSL is. With WS-Security developers need to determine when
to sign and encrypt, as well as decide on a token. And they need to decide on which order the sign, encrypt and get-token processes should occur.

In his analysis, using
WS-Security for signing and encryption also cuts application throughput between 5 percent and 50 percent.

At the heart of Hill’s criticism of WS-Security are XML digital certificates,
which he demonstrated to be unwieldy and large. Fundamentally, the goal of
XML digital certificates is to be able to sign digital content.

In gruesome detail, Hill discussed attack
vectors for every step of the signing process, going line by line through a basic XML digital
certificate that protected only a few words of text.

Among the issues he raised was the use of XSLT (define), which is in WS-Security and used to transform XML documents into other XML
documents. Hill noted that it would be very easy to create a loop with XSLT that could consume infinite resource with tiny messages.

This article was first published on InternetNews.com. To read the full article, click here.