On May 23, 2007, at 7:56 PM, Marc Prud'hommeaux wrote:



I asked a number of times for a security audit to be made of the security implications of JPA and it was never taken up. Most of the vendors make extensive use of privileged operations including getting system properties, reflection, and class loader operations and IMHO not enough attention was paid to getting it right.

That includes us. To be perfectly frank, in all the years of Kodo and OpenJPA, it has simply never been an issue.

Which doesn't mean that we shouldn't endeavor to fix the problems and do it all the right way, security-wise. I'm just pointing out that the demand for well-behaved security-sensitive applications is not as high as one might expect.

Implementing java2 security can create very complex code structures that are difficult for people to read, debug, maintain, and improve. If someone wants to implement this (and I would say that's a huge if), I would like to see the effort focused on making sure the code is still readable.

I really like kevin's suggestion to just pop in a wrapper if you care about Java2 security. Or maybe we can create a doPriv subclass of EMF, for those that care (of course open out calls like lifecycle callbacks would need an exit doPriv).

In my experience, I've never seen someone use Java2 security in production.

-dain

Reply via email to