Nick Sieger wrote:
On 6/28/07, Thomas E Enebo <[EMAIL PROTECTED]> wrote:
I say chuck it out since we are not even close to being correct in
this area.  It gives a false sense of security.  In fact, I wonder
what sort of audit MRI goes through to demonstrate that safe/taint is
working.  As far as I can tell tainting is really tough to get right
and keep right.

The Drb mention below makes me think we need to come up with a
creative solution to replace it (using Java's security mechanism in
some way).  I am hoping some enterprising community member who cares
about this will help find the true path...

Actually, I'm thinking the right path would be to promote
sandbox/javasand.  We just need to polish it up and get some examples
out there on how to secure a real-world application with it.  _eric's
irc bot is one example.

There's also the threading issue with it...since we allow a single native thread to cross into another runtime, there's no way for runtime A to kill runtime B without having access to the RubyThread associated with that runtime. In MRI this works ok because sandbox still uses the same core runtime but a different set of core classes for the sandboxes, so killing a target thread works.

But explicit sandboxing does seem like a better long-term approach. We (Sun) are going to be working with ko1 on his MVM research for Ruby 1.9, and I'm hoping that it will learn a lot from sandbox...ideally making sandbox more standard and providing a path forward for those using it.

- Charlie

---------------------------------------------------------------------
To unsubscribe from this list please visit:

   http://xircles.codehaus.org/manage_email

Reply via email to