On 03/06/2012 04:12 PM, Samus CTO (OpenERP) wrote:
> Of course we can use more descriptive vars but I have the habit to simplify
> iterators/indexes (column c, line l, index i, option o, value v), not just
> integers.

I was simply emphasizing that it's always better to be readable than concise.
If you have other habits, now may be a good time to change them ;-)
It literally takes negligible time for you to think and use a readable name
that will be self-explaining for all future readers of the code you write.
Having a one-letter name can sometimes increase readability when it is only
used on its own line (as is the case for a lambda or a list comprehension), but
in all other cases it's just laziness and hurts readability.


> About the security issue I think it's not really the business of our
> application. 

On the contrary, it is an important issue that OpenERP has to consider, because
users trust business critical private data to the system.
An average sysadmin will take obvious measures to protect the data such as not
giving physical access or root access to the server to everybody, but that is
usually not enough. Great applications can help by taking proactive steps to
avoid leaking sensitive data outside of the application's control without the
admin noticing.
I think this is one of them: we can help the admin avoid a not-so-obvious leak.


> Please read the following examples:
> * Many people love to make their configuration file readable by all. But we
> don't check permission of our config files and its not the role of our
> application

I don't think they "like" to do it. They just keep the default permissions that
the system assigns, period. Why do think SSH won't read accept a config file or
key file that is not strictly chmoded 600?
Actually it's a good point, we should do the same for the OpenERP config file,
which contains the same sensitive information as the environment - its
permissions should be checked.


> * Most programs make user able to enter a password in their command-line to
> allow scripting. The trick, I guess, is to make no user able to read the
> script but to execute it (example ldapsearch
> http://linux.die.net/man/1/ldapsearch

Perhaps one reason they do it is because they are not meant to be long-running
and don't leave an obvious track in the process list. Or just because they do
not consider their software to be sensitive enough. I think we should be more
cautious and look at the better examples rather than the worse ones ;-)

-- 
https://code.launchpad.net/~openerp-dev/openobject-server/trunk-environment-vars-cto/+merge/94564
Your team OpenERP R&D Team is subscribed to branch 
lp:~openerp-dev/openobject-server/trunk-environment-vars-cto.

_______________________________________________
Mailing list: https://launchpad.net/~openerp-dev-gtk
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~openerp-dev-gtk
More help   : https://help.launchpad.net/ListHelp

Reply via email to