[ https://issues.apache.org/jira/browse/CXF-2894?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Glen Mazza reopened CXF-2894: ----------------------------- Estimated Complexity: Moderate This problem has popped up in another place with respect to the EncryptedData element of the SOAP body. Metro is expecting this (see the wsse:KeyIdentifier element under SecurityTokenReference): <S:Body wsu:Id="_5006"> <xenc:EncryptedData xmlns:ns19="http://schemas.xmlsoap.org/ws/2006/02/addressingidentity" xmlns:ns18="http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512" xmlns:ns17="http://www.w3.org/2003/05/soap-envelope" Id="_5007" Type="http://www.w3.org/2001/04/xmlenc#Content"> <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" /> <ds:KeyInfo xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="KeyInfoType"> <wsse:SecurityTokenReference> <wsse:KeyIdentifier ValueType="http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID">uuid-7a6d6259-af70-466f-b6c6-fd89c44bea71 </wsse:KeyIdentifier> </wsse:SecurityTokenReference> </ds:KeyInfo> <xenc:CipherData> <xenc:CipherValue>FMIK0lHrb8mzP....more encrypted data....osjRq9bIsq85gg4CJa</xenc:CipherValue> </xenc:CipherData> </xenc:EncryptedData> </S:Body> But we are sending this instead (wsse:Reference instead of KeyIdentifier): <soap:Body xmlns: wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" wsu:Id="Id-20911796"> <xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="EncDataId-15" Type="http://www.w3.org/2001/04/xmlenc#Content"> <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" /> <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> <wsse:SecurityTokenReference xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"> <wsse:Reference xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" URI="#uuid-4635d8e6-2d7a-4679-b609-782c2177b740" /> </wsse:SecurityTokenReference> </ds:KeyInfo> <xenc:CipherData> <xenc:CipherValue>jp3E2kXyR+M....more encrypted data....ZsasdfasoD</xenc:CipherValue> </xenc:CipherData> </xenc:EncryptedData> </soap:Body> Metro is correct because of the same rationale given earlier, namely that the SAML Token Profile does not define usage of wsse:Reference for SAML Assertions, only KeyIdentifier or EmbeddedReference. (Section 3.3 of SAML Token Profile of 1 Dec. 2004 pdf lines 250-272.) However, unlike my earlier fix on the Signature side it looks like a change to WSS4J will be needed here. In particular (untested): 1.) (in CXF) SymmeticBindingHandler.doEncryption() needs new code similar to what I added for .doSignature(): if (!isRequestor()) { ... same current code... } else { // new block added if (encrToken instanceof IssuedToken) { encr.setUseKeyIdentifier(true); encr.setCustomReferenceValue(WSConstants.WSS_SAML_NS + WSConstants.SAML_ASSERTION_ID); encr.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } } 2.) (in WSS4J) Ability to handle SAML token references for encryption needs to be added: WSSecEncryptedKey.prepareInternal() method: switch (keyIdentifierType) { ...rest of old code... // add this case case WSConstants.CUSTOM_KEY_IDENTIFIER: secRef.setKeyIdentifier(customTokenValueType, customTokenId); break; } This additional case is identical to that already present in WSS4J's WSSecSignature.prepare() method. As a sanity check, can anyone see why the above case clause should be in WSS4J's WSSecSignature but *not* in their WSSecEncryptedKey? Hope not to embarrass myself to the WSS4J team. > use wsse:KeyIdentifier instead of wsse:Reference for SAML token profile > ----------------------------------------------------------------------- > > Key: CXF-2894 > URL: https://issues.apache.org/jira/browse/CXF-2894 > Project: CXF > Issue Type: Bug > Components: WS-* Components > Reporter: Glen Mazza > Assignee: Glen Mazza > Attachments: 20100714DoubleItMetroWSTrust.zip, CXF2894Example.txt > > > CXF should be using the KeyIdentifier element when identifying SAML > Assertions within wsse:SecurityTokenReference elements. > Issue and explanation in this thread: > http://cxf.547215.n5.nabble.com/Problem-using-SAML-token-profile-to-access-a-Metro-web-service-td1064848.html#a1064848 > Attached zip contains a Metro web service and STS (intended for standalone > Tomcat deployment), a working Metro client, and a complaining CXF one, all > components Mavenized for easily compilation, deployment, and execution. > Instructions to host sample web service and STS from attachment: > 1.) If necessary, to allow mvn tomcat:deploy to work in next step, set up > Maven tomcat config: > Pale green "Maven only" section of Step #8 here has instructions: > http://www.jroller.com/gmazza/entry/web_service_tutorial#WFstep8 > 2.) From root directory, type mvn clean install tomcat:deploy > (can call tomcat:undeploy on subsequent runs) > Once done, confirm can see Metro web service WSDL from browser: > https://localhost:8443/doubleit/services/doubleit?wsdl > And confirm can see Metro STS WSDL: > http://localhost:8080/DoubleItSTS/DoubleItSTSService?wsdl > 3.) > Place the 2.2 version of jaxws-api.jar (https://jax-ws.dev.java.net/) in the > JDK_HOME/jre/lib/endorsed folder. > Once done, navigate to Metro client folder (/client-metro) and run mvn > exec:exec > Confirm can see output of doubled number results (10 doubled is 20). > Wireshark results of the whole STS process w/Metro is here: > http://www.jroller.com/gmazza/entry/metro_wstrust_analysis > 5.) > Remove 2.2 JAXWS-api.jar from endorsed folder. > Navigate to CXF client folder (/client-cxf) and run > mvn clean install exec:exec (need to build here, as client-cxf is not part of > parent POM due to Metro dependencies.) > Should see this error message: > [INFO] Jul 14, 2010 8:00:46 AM > org.apache.cxf.service.factory.ReflectionServiceFactoryBean > buildServiceFromWSDL > [INFO] INFO: Creating Service > {http://www.example.org/contract/DoubleIt}DoubleItService from WSDL: > file:/work/workspace/DoubleItMetroWSTrust/client-cxf/src/main/resources/DoubleItService.wsdl > [INFO] Jul 14, 2010 8:00:48 AM > org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor handleMessage > [INFO] WARNING: Request does not contain required Security header, but it's a > fault. > ----->[INFO] Exception in thread "main" javax.xml.ws.soap.SOAPFaultException: > unsupported directreference ValueType > http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID<----- > [INFO] at > org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:146) > [INFO] at $Proxy38.doubleIt(Unknown Source) > [INFO] at client.WSClient.doubleIt(WSClient.java:18) > [INFO] at client.WSClient.main(WSClient.java:11) > [INFO] Caused by: org.apache.cxf.binding.soap.SoapFault: unsupported > directreference ValueType > http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID > [INFO] at > org.apache.cxf.binding.soap.interceptor.Soap11FaultInInterceptor.unmarshalFault(Soap11FaultInInterceptor.java:75) > [INFO] at > org.apache.cxf.binding.soap.interceptor.Soap11FaultInInterceptor.handleMessage(Soap11FaultInInterceptor.java:46) > [INFO] at > org.apache.cxf.binding.soap.interceptor.Soap11FaultInInterceptor.handleMessage(Soap11FaultInInterceptor.java:35) > [INFO] at > org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243) > If you can use Wireshark to trace localhost calls (always can on Linux, > sometimes on Windows), can use Wireshark's Show TCP stream capability to get > more of error message: > http://www.jroller.com/gmazza/entry/soap_calls_over_wireshark -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.