Bertrand Mansion wrote:
On Fri, Dec 11, 2009 at 9:55 PM, Paul Bohme <kepler-proj...@bohme.org> wrote:
Thus, in environments that are
sensitive to security, simple escaping is insufficient.

Any concrete examples (or is this just FUD) ?

It's a matter of principle. Any database worth its salt is going to provide a way to put a hard separation around data to make sure it stays that way. The queries are supplied by code (so as pointed out elsewhere in this thread DDL and such are a non-issue in that case) so as long as you can be 100% sure that data remains data then it is not a vector for attack.

Escaping input is an eternal game of whack-a-mole - which is what makes it difficult in discussions like this. For every point someone brings up, someone else can describe a way to escape it. The problem is that you have to think of *everything* that can possibly be done. If you have that conceptual difference between code and data, this is a solved problem..

 -P


_______________________________________________
Kepler-Project mailing list
Kepler-Project@lists.luaforge.net
http://lists.luaforge.net/cgi-bin/mailman/listinfo/kepler-project
http://www.keplerproject.org/

Reply via email to