31.08.2014 15:51, Carlos H. Cantu wrote:
 >
> We have a "hack" that many people uses for a long time, to make it
> more difficult to stole procedures/triggers source (more difficult,
> not impossible, since BLR can be decoded to source). They know it is
> not 100% safe, but so far it is the only way to avoid
> "standard/common" users (the ones who knows only how to connect to
> database and run select), to have access to the sources.

What about unencrypted distributed databases? Should we care about 
hiding PSQL source also from SYSDBA / DBO? Are there real cases when it 
would be needed?

> 1) Create an official way to make the source null
> 2) Create a way to obfuscate the source
> 3) Create a way to store the source encrypted
> 4) Leave the rdb$procedures and rdb$triggers writable (or at list the
> source field).
> 5) Create special privilege for users to be able to retrieve the
> source code.

See my question above. I would hate to support an object-level privilege 
that can be revoked from the object owner. And, given how our security 
works now, it won't work for SYSDBA anyway.

> 1, 4 and 5 seems to be the only solutions that could be done without
> delaying FB 3 release (core developers can confirm this).

So far I tend voting for (1), using a special syntax.


Dmitry


------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to