You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Next »

Interfaces are used to group together all the methods that a class promises to publicly expose. The implementing classes are obliged to provide concrete implementations for all these methods. Interfaces are a necessary ingredient of the public API and once released, it can be very hard to fix any flaws without breaking any code that implements the older version. By far, the security specific repercussions include:

  • The interface changes resulting from security fixes can severely impair the contracts of the implementing classes. It is even possible that a security fix introduced in a later version is accompanied by modifications to an unrelated interface that must now be implemented by the client. This can prevent the client from implementing the security fix because the new interface may impose additional implementation burden on it.
  • If an insider crafts changes to an interface or someone accidentally makes modifications, most of the client code that implements the interface will break resulting in denial of service. This is particularly pernicious in distributed Java based applications.
  • Implementers can provide skeletal implementations that the clients can directly extend, however, such code can adversely affect the behavior of the subclasses. When these are not provided, the subclasses are forced to provide dummy implementations. This fosters an environment where comments such as 'ignore this code, does nothing', occur incessantly. Such code may never even get tested.
  • If there is a security flaw in a public API (consider ThreadGroups, CON01-J. Avoid using ThreadGroup APIs) it will persist throughout the lifetime of the application.

Noncompliant Code Example

In this example, an interface User is frozen with two methods authenticate() and subscribe(). Sometime later, the providers release a free service that does not rely on authentication. The addition of the freeService() method, unfortunately, breaks all the client code that implements the interface. Moreover, the implementers who wish to use only freeService have to face the onus of also providing the other two methods which pollute the API, for reasons discussed earlier.

public interface User {
  boolean authenticate(String username, char[] password);
  void subscribe(int noOfDays);
  void freeService(); // introduced after the class is publicly released
}

Noncompliant Code Example

An alternative idea is to prefer abstract classes for dealing with constant evolution, but this comes at the cost of flexibility that interfaces offer. One notable pattern is for the provider to distribute an abstract skeletal class that implements the evolving interface. The skeletal class can selectively implement a few methods and force the extending classes to provide concrete implementations of the others. If a new method is added to the interface, the skeletal class can provide a non-abstract default implementation that the extending class can optionally override. This pattern is dangerous because a provider is unaware of the extending class's code and may choose an implementation that introduce security weaknesses in the client API.

public interface User {
  boolean authenticate(String username, char[] password);
  void subscribe(int noOfDays);
  void freeService(); // introduced after the class is publicly released
}

abstract class SkeletalUser implements User {
  public abstract boolean authenticate(String username, char[] password);
  public abstract void subscribe(int noOfDays);
  public void freeService() { 
    /* added later, provide implementation and re-release class*/ 
  }
}

class Client extends SkeletalUser {
  // implements authenticate() and subscribe(), not freeService()
}

Compliant Solution (1)

A better design strategy is to anticipate the future evolution of the service. The core functionality should be implemented in the User interface and in this case, only the premium service may be required to extend from it. To avail of the new free service, an existing class may then choose to simply implement the new interface FreeUser or just completely ignore it.

public interface User {
  boolean authenticate(String username, char[] password);
}

public interface PremiumUser extends User {
  void subscribe(int noOfDays);
}

public interface FreeUser {
  void freeService();
}

Compliant Solution (2)

Another compliant solution is to throw an exception from within the new method defined in the implementing subclass.

class Client implements User {
  public void freeService() {
    throw new AbstractMethodError();
  } 
}

Compliant Solution (3)

Although allowable, a less flexible method is to delegate the implementation of the method to subclasses of the client's core interface implementing class.

abstract class Client implements User  {
  public abstract void freeService(); // delegate implementation of new method to subclasses
  // other concrete implementations
}

A variant of compliant solution (2) can also be applied here by throwing an exception from freeService after making the class (and method) non-abstract.

Risk Assessment

Failing to publish stable, flaw-free interfaces can break the contracts of the implementing classes, pollute the client API and possibly introduce security weaknesses in the implementing classes.

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MSC05- J

low

probable

high

P2

L3

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

References

[[Bloch 08]] Item 18: "Prefer interfaces to abstract classes"


MSC04-J. Prefer using Iterators over Enumerations      49. Miscellaneous (MSC)      MSC06-J. Avoid mixing generic and non-generic code if possible

  • No labels