Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This was my experience as well, trying to convinced enterprise security folks to let new protocols through firewalls was nearly impossible.

The difficulty was exponentiated for api/service calls inbound to the organization.

SOAP services, even though they went over http, had to go through special inspection devices because XML parsing libraries were so complex and prone to parsing issues and security vulns.



> SOAP services, even though they went over http, had to go through special inspection devices because XML parsing libraries were so complex and prone to parsing issues and security vulns.

So did the person who ordered that inspection device realize that the SOAP streams under inspection would be examined using a set of XML parsing libraries that are complex and prone to vulnerabilities? Seems like this setup just creates another device that must be maintained. Perhaps the solution would be to use another machine to inspect the inspection devices. Turtles all the way down.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: