mace-opensaml-users - protocol weakness?
Subject: OpenSAML user discussion
List archive
- From: "Daniel Germanus" <>
- To:
- Subject: protocol weakness?
- Date: Wed, 16 Apr 2008 17:23:41 +0200
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=klwleeMWqDNzj5Iq+l1OZ2y+SeE46BKMuEjWm0dc9NN5K7DPcpBWlkQVasAAbCf74dYHx3mLz7LDaqqebV8H0nyYIUqhUxni/oqe1FEtvfIyJMQqNdHRjzjzlov+pvSsuz3LRltoQQvrucwxwcFOlSDkMz+hnipnuK+wzbSOnu8=
Hello All,
as I'm currently fabricating a study on protocol fuzzing, I'm
interested if there are any attack vectors known for SAML (any
version) in general or for the OpenSAML (any version) project. Attack
vectors could be of syntactical or semantical nature, e.g., is there
any possibility of injecting a replayed message?
cheers,
Daniel
- protocol weakness?, Daniel Germanus, 04/16/2008
- RE: [OpenSAML] protocol weakness?, Scott Cantor, 04/16/2008
Archive powered by MHonArc 2.6.16.