Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: headings of code examples changed from h1 to h2.

...

Note that this rule lacks any assumptions about the integrity of the data being sent down a socket. For information about ensuring data integrity, see rule SER02-J. Sign then seal sensitive objects before sending them outside a trust boundary.

Noncompliant Code Example

This noncompliant code example shows the use of regular sockets for a server application that fails to protect sensitive information in transit. The insecure code for the corresponding client application follows the server's code.

...

Note that the sockets are properly closed in accordance with rule ERR05-J. Do not let checked exceptions escape from a finally block.

Compliant Solution

This compliant solution uses SSLSocket to protect packets using the SSL/TLS security protocols.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="52c10914eee2be94-bd6e833a-474544dd-9c62abcf-608fccddeb0a2713f211ff7e"><ac:plain-text-body><![CDATA[

[[API 2006

AA. References#API 06]]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bbc2b2bf7846f7aa-e39ba3bd-43c74d5f-a39f9a06-cef9897cca00b13b9e900058"><ac:plain-text-body><![CDATA[

[[Gong 2003

AA. References#Gong 03]]

11.3.3, Securing RMI Communications

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cf798d75c69f0910-2139540f-483340c1-979a8a16-8c2be51e13a960825c24856c"><ac:plain-text-body><![CDATA[

[[Ware 2008

AA. References#Ware 08]]

 

]]></ac:plain-text-body></ac:structured-macro>

...