[Python-Dev] Restricted execution: what's the threat model?

2006-07-12 Thread Jim Jewett
Ka-Ping Yee writes: A. The interpreter will not crash no matter what Python code it is given to execute. Why? We don't want it to crash the embedding app (which might be another python interpreter), but if the sandboxed interpreter itself crashes, is that so bad? The embedding app

Re: [Python-Dev] Restricted execution: what's the threat model?

2006-07-12 Thread Bob Ippolito
On Jul 12, 2006, at 2:23 PM, Jim Jewett wrote: Ka-Ping Yee writes: A. The interpreter will not crash no matter what Python code it is given to execute. Why? We don't want it to crash the embedding app (which might be another python interpreter), but if the sandboxed interpreter

Re: [Python-Dev] Restricted execution: what's the threat model?

2006-07-12 Thread Brett Cannon
On 7/12/06, Jim Jewett [EMAIL PROTECTED] wrote: Ka-Ping Yee writes: A.The interpreter will not crash no matter what Python code it is given to execute.Why?We don't want it to crash the embedding app (which might be another python interpreter), but if the sandboxed interpreter itself crashes,is

[Python-Dev] Restricted execution: what's the threat model?

2006-07-06 Thread Ka-Ping Yee
After reading the messages on this thread i'm starting to think that it would be good to clarify what kinds of threats we are trying to defend against, and specify what invariants we are intending to preserve. For example, here are a few things Brett mentioned: Right. I am thinking more of an

Re: [Python-Dev] Restricted execution: what's the threat model?

2006-07-06 Thread Michael Chermside
Ka-Ping Yee writes: i'm starting to think that it would be good to clarify what kinds of threats we are trying to defend against, and specify what invariants we are intending to preserve. Yes! So here are a couple of questions for clarification (some with my guesses as to their answers):

Re: [Python-Dev] Restricted execution: what's the threat model?

2006-07-06 Thread Brett Cannon
[replying to both Ping and Michael in the same email]On 7/6/06, Michael Chermside [EMAIL PROTECTED] wrote: Ka-Ping Yee writes: i'm starting to think that it would be good to clarify what kinds of threats we are trying to defend against, and specify what invariants we are intending to