[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

Re: Extra headaches of securing XML


Re:  Extra headaches of securing XML
Rich Salz wrote:
>> and I'd bet a zillion bucks that there are awful vulnerabilities 
>> lurking in the cracks where nobody could possibly have thought to 
>> look.  -Tim
> There are some that are inherent in XML itself: entities for example, 
> and the fact that there are no size limits (element name with 1e6 
> characters, or 1e6 attributes, or a document 1e6 elements deep). This 
> makes XML inherently more "dangerous" than classic binary formats like 
> ASN.1/DER.
> 
> There are some dangerous corners when you mix and match various XML 
> technologies.  For example, just because the incoming message 
> schema-validates doesn't mean that (a) you have the right schema (does 
> your verifier just blindly trust xsi:schemaLocation attributes)?, or (b) 
> that it's really secure (does your schema limit xsd:string such that SQL 
> injection atttacks are prohibitied).
> 
> There are areas to be concerned when exposing (transactional) 
> back-office systems to the looser mix of XML and Web technologies, 
> causing trade-offs to perhaps be made in the "wrong" direction.  Len 
> alluded to this in his usual elliptical style. :)
> 
> Hope this helps.

It is so much more helpful than FUD. Some are things an XML processor 
can actually do something about, e.g., by allowing an application to 
impose constraints on incoming documents in addition to those imposed by 
XML, by allowing an application to override schema locations, etc. 
Others, e.g., preventing SQL injection, must be handled at the 
application level, but might benefit from better validation tools.

In some cases, the XML recommendations themselves value interoperability 
over robust processing (the ability to gracefully survive both 
unintentionally and malevolently malformed documents). Can an 
implementation limit the size of identifiers and strings, or the maximum 
length of a document? Is it allowed to ignore a SYSTEM id identifying an 
external DTD, or to report as errors attempts to redefine declarations 
in an external DTD? Fixing the recommendations might take a long time, 
might never happen. In the meantime, the community might reconsider its 
usual knee-jerk negative reaction to "XML subsets" intended to address 
security-related issues.

Discussing these issues out in the open, raising the level of awareness, 
is essential to moving the community forward. Most XML processors (or 
standards) aren't built by the secret society of "security experts".

Bob Foster


PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.