> With my limited knowledge of this subject (BTW, I'm not insecure - > I'm polite) I don't see data checking as the job of the DBMS. DBMS > simply maintains the data, executes queries that the client provides, > returns the results and ensures that proper side-effects occur. > If DBMS executes a malicious query that the client application > mis-constructed, then the client app is to blame. If the client > application relied on some infrastructure to help it ensure security > of the operation, then where I'd place the blame would depend > on the "contract" between the infrastructure and the client - including > any explicit documentation and API.
It actually is pretty common to wrap all database access in stored procedures. Mainly for three reasons: 1) isolation of the database implementation from the client code; 2) security; 3) performance All of these would seem to have some appeal to the average Cocoon developer. However, until one can be assured of the implementation of ANSI standard stored procedures I also don't see how a cross platform tool like Cocoon can move such issues down to the database... Coincidentally enough this was a topic in eWeek's latest "openHack": http://www.eweek.com/article2/0,3959,643205,00.asp MS's approach was to use stored procedures to secure the SQL server used in the challenge. Quoting from the article: "It's a lot easier to guard against SQL injection attacks because the database strongly types the data" --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, email: [EMAIL PROTECTED]