> With my limited knowledge of this subject (BTW, I'm not insecure -
> I'm polite) I don't see data checking as the job of the DBMS. DBMS
> simply maintains the data, executes queries that the client provides,
> returns the results and ensures that proper side-effects occur.
> If DBMS executes a malicious query that the client application
> mis-constructed, then the client app is to blame. If the client
> application relied on some infrastructure to help it ensure security
> of the operation, then where I'd place the blame would depend
> on the "contract" between the infrastructure and the client - including
> any explicit documentation and API.

It actually is pretty common to wrap all database access in stored
procedures.  Mainly for three reasons:

1) isolation of the database implementation from the client code;

2) security;

3) performance

All of these would seem to have some appeal to the average Cocoon developer.
However, until one can be assured of the implementation of ANSI standard
stored procedures I also don't see how a cross platform tool like Cocoon can
move such issues down to the database...

Coincidentally enough this was a topic in eWeek's latest "openHack":

        http://www.eweek.com/article2/0,3959,643205,00.asp 

MS's approach was to use stored procedures to secure the SQL server used in
the challenge.  Quoting from the article: "It's a lot easier to guard
against SQL injection attacks because the database strongly types the data"

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, email: [EMAIL PROTECTED]

Reply via email to