Reviewing just the source code without any high level overview and explanation how and why it is implemented in a particular way
is difficult (if possible at all).

That is why it would be really helpful if the questions asked were answered.

Not only researchers are interested - also potential users and contributors.

Thanks,
Michal

Peter wrote:
I can't make any guarantee that it is secure, but the more people review it, 
the more likelihood bugs and flaws will be identified.

I'm especially interested in security researchers checking it out if they're 
interested.

Cheers,

Peter.

Sent from my Samsung device.
Include original message
---- Original message ----
From: Michał Kłeczek<mic...@kleczek.org>
Sent: 15/02/2017 08:04:39 pm
To: dev@river.apache.org
Subject: Re: deserialization remote invocation strategy


  The code actually does what I've described above, but don't take my word for 
it, check it for youself. :)

  If you disagree, don't use it.
It works the other way around - before I decide to use it - I have to understand how it works.
Even more so if we are talking about security.

That is why I consider scrutiny and questioning a Good Thing in this context.

"Check for yourself" is not an encouraging advice in the area of security :)

Cheers,
Michal




Reply via email to