The set of classes to provide the info does implement the proper security,
but I can't see anything restricting the (non-privileged) author of the
style sheet from maliciously calling other classes' methods, for example sql
or File, in whatever way they want; this appears to be why the 
FEATURE_SECURE_PROCESSING flag was created to turn off function extensions. 
The server which would be processing the transformations has full access to
the information (not to mention file systems etc), but is firewalled and
securely presents information to web-based clients.  XSL looks like a great
way to let clients build xhtml-formatted reports using a limited set of
functions I provide to access the information.

I suppose I could create a separate java "client" process specifically for
this purpose and sandbox it into a safe place, but I think the
effort/duplication/maintainence would be huge relative to what I'm trying to
accomplish.. 


Dave Brosius-2 wrote:
> 
>>> So is there any way of limiting which java classes
>> can be accessed as extensions?
> 
> 
> I doubt it.
> 
> I'm assuming you have a set of classes that provide all the secure 
> information, however. If a user altered the style sheet, added their own
> extension functions, don't they still have to add some point then call
> your 
> classes to get the secure information, and therefore, isn't that the point 
> were you
> can enforce security. Perhaps, i'm still not grasping the entirety of your 
> problem.
> 
> 

-- 
View this message in context: 
http://www.nabble.com/Usage-model---no-source-XML%2C-just-api-calls-tp22264025p22280776.html
Sent from the Xalan - J - Users mailing list archive at Nabble.com.

Reply via email to