Hello :)

It's ok for me I will fulfill the expectations.


On Wed, 2012-03-07 at 18:16 +0000, Olivier Dony (OpenERP) wrote:
> On 03/06/2012 04:12 PM, Samus CTO (OpenERP) wrote:
> > Of course we can use more descriptive vars but I have the habit to simplify
> > iterators/indexes (column c, line l, index i, option o, value v), not just
> > integers.
> 
> I was simply emphasizing that it's always better to be readable than concise.
> If you have other habits, now may be a good time to change them ;-)
> It literally takes negligible time for you to think and use a readable name
> that will be self-explaining for all future readers of the code you write.
> Having a one-letter name can sometimes increase readability when it is only
> used on its own line (as is the case for a lambda or a list comprehension), 
> but
> in all other cases it's just laziness and hurts readability.
> 
> 
> > About the security issue I think it's not really the business of our
> > application. 
> 
> On the contrary, it is an important issue that OpenERP has to consider, 
> because
> users trust business critical private data to the system.
> An average sysadmin will take obvious measures to protect the data such as not
> giving physical access or root access to the server to everybody, but that is
> usually not enough. Great applications can help by taking proactive steps to
> avoid leaking sensitive data outside of the application's control without the
> admin noticing.
> I think this is one of them: we can help the admin avoid a not-so-obvious 
> leak.
> 
> 
> > Please read the following examples:
> > * Many people love to make their configuration file readable by all. But we
> > don't check permission of our config files and its not the role of our
> > application
> 
> I don't think they "like" to do it. They just keep the default permissions 
> that
> the system assigns, period. Why do think SSH won't read accept a config file 
> or
> key file that is not strictly chmoded 600?
> Actually it's a good point, we should do the same for the OpenERP config file,
> which contains the same sensitive information as the environment - its
> permissions should be checked.
> 
> 
> > * Most programs make user able to enter a password in their command-line to
> > allow scripting. The trick, I guess, is to make no user able to read the
> > script but to execute it (example ldapsearch
> > http://linux.die.net/man/1/ldapsearch
> 
> Perhaps one reason they do it is because they are not meant to be long-running
> and don't leave an obvious track in the process list. Or just because they do
> not consider their software to be sensitive enough. I think we should be more
> cautious and look at the better examples rather than the worse ones ;-)
> 



-- 
https://code.launchpad.net/~openerp-dev/openobject-server/trunk-environment-vars-cto/+merge/94564
Your team OpenERP R&D Team is subscribed to branch 
lp:~openerp-dev/openobject-server/trunk-environment-vars-cto.

_______________________________________________
Mailing list: https://launchpad.net/~openerp-dev-gtk
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~openerp-dev-gtk
More help   : https://help.launchpad.net/ListHelp

Reply via email to