Skip to Content.
Sympa Menu

mace-opensaml-users - protocol weakness?

Subject: OpenSAML user discussion

List archive

protocol weakness?


Chronological Thread 
  • From: "Daniel Germanus" <>
  • To:
  • Subject: protocol weakness?
  • Date: Wed, 16 Apr 2008 17:23:41 +0200
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=klwleeMWqDNzj5Iq+l1OZ2y+SeE46BKMuEjWm0dc9NN5K7DPcpBWlkQVasAAbCf74dYHx3mLz7LDaqqebV8H0nyYIUqhUxni/oqe1FEtvfIyJMQqNdHRjzjzlov+pvSsuz3LRltoQQvrucwxwcFOlSDkMz+hnipnuK+wzbSOnu8=

Hello All,

as I'm currently fabricating a study on protocol fuzzing, I'm
interested if there are any attack vectors known for SAML (any
version) in general or for the OpenSAML (any version) project. Attack
vectors could be of syntactical or semantical nature, e.g., is there
any possibility of injecting a replayed message?

cheers,
Daniel



Archive powered by MHonArc 2.6.16.

Top of Page