On 10/12/2010 02:57 PM, Michal Kleczek wrote:
No you don't. You can delegate it to the IntegrityVerifier. This is the
place where you should check the integrity. You will have enough
information there (coded in the codebase parameter), to load the code,
check endpoints (dns name, ip address, TLS) if wanted, check signatures,
certificates, checksums.

Right - but it looks to me we're turning circles right now. Maybe I just don't
understand what you're saying so let me describe a scenario that I would like
to support:
1. Prerequisite - you and I are logged in to the same Kerberos realm and I
know your kerberos principal
2. I got a piece of data - a marshalled object
3. Before I deserialize an object I want to make sure the codebase of the
object I got is the one you wanted it to be (regardless of the contents of the
jar file I will download later - I'm going to check its integrity later on)

My take on this, is that we should lower the prerequisite, and still have a robust implementation. We are talking about the internet are we? How many of us share a kerberos realm?

I dont like the idea, that we allow full deserialization before we have had a change to let the IntegrityVerifier have a look at it. And if you want to fix that, you've created a snake biting its own arse. And we wont have that do we?

Gr. Sim

Reply via email to