Jim McAtee wrote:

> A question was posed on another mailing list that I'm on regarding
> securing web directories from users on a shared IIS hosting machine.
> 
> In CF Enterprise you can use sandbox security to keep CF scripts and
> CFFILE and CFDIRECTORY confined to a user's own directory.  Are there
> any similar mechanisms in a shared ASP hosting environment to limit ASP
> scripts from doing directory listings or reading another site's source
> code?


Yes and No. You ca have 2 types of Sandboxes, OS level and CF level 
Sandboxes. With OS level Sandboxes the CF Server upon receiving a 
request from the webserver finds the appropriate Sandbox username and 
logs on to the OS as that OS user. Then, while impersonating that OS 
user, it tries to execute the request. Naturally in a good setup of ACLs 
this means security like the user actually logs in to the server and 
tries the request by hand.
ASP works exactly the same as this model.

Additionally in CF you have the model where all the ACLs are checked 
inside CF but not against the OS. In theory this can give a more refined 
security level, because CF in memory constructs (cached queries, 
application level variables etc.) don't have an OS user associated with 
them, and therefore you can't protect them with OS Sandboxes. In 
practice I have never seen a server that has got everything completely 
locked down, since it is simply to much work.

I am not familiar enough with ASP to be able to tell you how the in 
memory constructs security is handled, but the rest works the same as OS 
Sandboxes in CF.
Actual account information is read from the IIS directory security settings.

Jochem


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
------------------------------------------------------------------------------
To unsubscribe, send a message to [EMAIL PROTECTED] with 
'unsubscribe' in the body or visit the list page at www.houseoffusion.com

Reply via email to