I'm a little fuzzy on a few code access security basics. It seems like a
reasonable approach (essentially a "configurable sandbox") but I'm not
exactly sure how .NET determines the evidence for an assembly. Some
information could come from the strong name (that's simple enough), but
what about the security "zone" (intranet/Internet/local)?

For example, I'm trying out a few different deployment methods with a
distributed application. Which ones of these could cause the downloaded
assembly to have a new zone (and thus restricted permissions, unless I
specifically modify the security policy):

* Dynamically retrieving an assembly from a web service as an array of
bytes, then saving it to disk and running it with Assembly.LoadFrom() and
a local path.

* Downloading and running a "shadow copy" of an assembly using the
Assembly.LoadFrom() method with a URI to a remote server.

* Using the codeBases attribute in a configuration file to specify a
remote computer URI for updates to an assembly.

My thinking is that the zone evidence will change for the last two, but
not the first one. Is this right?

Thanks,
Matthew

You can read messages from the Advanced DOTNET archive, unsubscribe from Advanced 
DOTNET, or
subscribe to other DevelopMentor lists at http://discuss.develop.com.

Reply via email to