hack of VOEvent to include W3C signature
Rob Seaman
seaman at noao.edu
Tue Jan 10 21:19:39 PST 2006
Howdy,
> One aspect of reliable messaging is ensuring the packet comes via
> the route you think it should so if a user subscribes to a broker
> how can they verify that packets are coming via the broker and not
> from some phishing broker: only if the broker attaches its
> signature to the VOEvent as it relays packets from a publisher (who
> also signed the VOEvent).
Am a little unclear how VOEvent phishing would work - how would the
phish bite? Certainly unsigned packets would be subject to man-in-
the-middle attacks, if you can call a unidirectional interception and
substitution such a thing. Suppose the iamalive and acks also
provide some level of confidence against shenanigans. This does
raise the issue of guaranteed receipt again, though.
Ultimately, do we care what path the packets take to get from point A
to point B? An originating signature remains valid whether or not Al
Capone (or Truman Capote) is fiddling with the packets betwixt.
> I would like to second Steve's additions to v1.1 of the schema.
Certainly agree that we will need the ability to attach one or more
signatures. (How often these will be used in practice will be an
interesting experiment.) Not convinced the signatures will need to
retain information about their ordering (or the addition of other
tracking metadata).
Rob
More information about the voevent
mailing list