Sample Event Service objects Discovery challenges:

80 Copyright © 2010 Open Geospatial Consortium, Inc. it should not necessary to hand-craft XML queries to perform searches it should not be a requirement that one has extensive knowledge of a given registry model in order to effectively query against it. 8 Quality of service considerations This section discusses Quality of Service aspects relevant in an Event Architecture. Emphasis is laid on security. Reliability is discussed shortly as well.

8.1 Event Security

8.1.1 Introduction

During OWS-7, initial work on Event Service Security was performed. The resulting discussions and findings are summarized in the following sections. Note that the presented results represent the start of much more intensive investigation and testing that is needed to achieve a clear understanding of the relevant aspects and solutions for enabling security in an Event Architecture.

8.1.2 General Event Service Security Measures and Threats

The Event Service is an information broker in a SOA environment that routes messages from event sources to information consumers that have expressed interest in a particular type of information by subscribing to it. The Event Service sends the information to the subscribers on behalf of the original event sources. The messages can travel over multiple physical nodes in a network communicating via a mixed LAN and WAN infrastructure using different transport protocols e.g. HTTP, JMS....

8.1.2.1 Security threats and vulnerabilities

A vulnerability in security sense is any weakness that could be exploited to violate a system or the data it contains. A threat can be described as a potential violation of security. The following threats might occur in the event service domain: Data destruction e.g. subscriptions, publications, notifications… Unauthorized creation of malicious subscriptions Unauthorized modification and corruption of data Theft and loss of data Unauthorized disclosure of data Copyright © 2010 Open Geospatial Consortium, Inc. 81 Service disruptions affecting SLA Service Level Agreement Threats can be classified as accidental or intentional thefts: Accidental threats are threats that exist with no explicit intention e.g. system errors and software defects. Intentional threats are threats which are explicitly planned and executed. They may range from using monitoring tools to very sophisticated security threats. In addition, threats may be active or passive: Passive threats would not result in any modification to any data contained in the event system and where neither the operation nor the state of the system is changed e.g. wire tapping. Active threats to a system involve the alteration of data changes or the state of the system e.g. modification, deletion and creation of notifications. Some specific threats and vulnerabilities are described in the following sections.

8.1.2.1.1 Denial of service

This attack may involve reducing traffic or it may generate extra traffic to the Event Service or broker. It is also possible to generate messages intended to disrupt the normal operations of the Event Service. For example, creation of too many subscriptions with complex filter may limit the processing power of an Event Service and as consequence critical subscriptions can no longer be handled properly or according to SLA.

8.1.2.1.2 Message replay

A message replay attack occurs when a recorded valid message, or any part of that message, is repeated to produce an unauthorized effect. For example, a valid message containing authentication information may be replayed by another entity in order to authenticate itself as something that it is not - spoofing identity. To detect and eliminate this attack, mechanisms should be used to identify replayed messages such as timestamps, nonces or message sequencing – these can also be used to prevent replay of messages.

8.1.2.1.3 Message modification

Modification of a message occurs when the content of a message or the whole message is altered without detection and results in an unauthorized effect. Even if a message is encrypted it might be possible to change it without even understanding it e.g. malleability property of cryptographic algorithm. To enable the receiver to detect alteration, a digital signature can be applied by the sender to the message hash.