On Wed, Dec 19, 2012 at 1:02 PM, Jan T Kim <jtt...@googlemail.com> wrote:

> On Wed, Dec 19, 2012 at 12:39:21PM +0100, Joris Meys wrote:
> > The safest way to prevent attacks using an R connector, is managing the
> > permissions for the application on your own server. We do that with the
> > RStudio Server application we have running. You have to take into account
> > that R allows for many interactions with the system. Also file(), dir(),
> > unlink() and all sys. functions have the potential to screen and possibly
> > alter your system. Not only system() and eval() pose a security
> problem...
>
> just out of curiosity, how do you disable these functions?


You got me wrong: We don't disable these functions, we just don't give the
R instance that's executing the file any permissions on the system. So
trying to run any function that wants to access the system only results in
error messages. I believe we did that by creating a specific user account
and linked that to the R application behind the interface. But sandboxing
(as you mentioned) is just as good.

-- 
Joris Meys
Statistical consultant

Ghent University
Faculty of Bioscience Engineering
Department of Mathematical Modelling, Statistics and Bio-Informatics

tel : +32 9 264 59 87
joris.m...@ugent.be
-------------------------------
Disclaimer : http://helpdesk.ugent.be/e-maildisclaimer.php

        [[alternative HTML version deleted]]

______________________________________________
R-devel@r-project.org mailing list
https://stat.ethz.ch/mailman/listinfo/r-devel

Reply via email to