Re: Restricted Execution of untrusted code

2008-11-18 Thread Ben Finney
"Emanuele D'Arrigo" <[EMAIL PROTECTED]> writes: > My target OS however are XP and Vista. I did find chroot-like > features in various virtualization platforms for those OS, but it > would definitely be overkill to request the user that he installs a > virtualization software to run a small applica

Re: Restricted Execution of untrusted code

2008-11-18 Thread Emanuele D'Arrigo
Thanks to those who replied and sorry for not having replied sooner. Ok, got the message: chroot jail. I understand chroot is available for unix-like OS as a kernel-provided facility. If I was developing for, say, Linux or maybe even MacOSX, it might even be easy. My target OS however are XP and V

Re: Restricted Execution of untrusted code

2008-11-02 Thread Roy Smith
In article <[EMAIL PROTECTED]>, Ben Finney <[EMAIL PROTECTED]> wrote: > "Emanuele D'Arrigo" <[EMAIL PROTECTED]> writes: > > > On Nov 1, 12:44 am, Lawrence D'Oliveiro wrote: > > > I think the most reliable solution is to take advantage of a level > > > in the system that already has to provide p

Re: Restricted Execution of untrusted code

2008-11-02 Thread Ben Finney
"Emanuele D'Arrigo" <[EMAIL PROTECTED]> writes: > On Nov 1, 12:44 am, Lawrence D'Oliveiro wrote: > > I think the most reliable solution is to take advantage of a level > > in the system that already has to provide protection against > > malicious code: use a chroot jail. […] > > [sigh] That sound

Re: Restricted Execution of untrusted code

2008-11-02 Thread Emanuele D'Arrigo
On Nov 1, 12:44 am, Lawrence D'Oliveiro wrote: > I think the most reliable solution is to take advantage of a level in the > system that already has to provide protection against malicious code: use a > chroot jail. Or run a complete virtualized machine with its own OS > installation. Then the code

Re: Restricted Execution of untrusted code

2008-10-31 Thread Lawrence D'Oliveiro
In message <[EMAIL PROTECTED]>, Emanuele D'Arrigo wrote: > I noticed that this issue has been discussed in this newsgroup > periodically over the years and I seem to understand that - > comprehensive- safe/restricted execution of untrusted code in python I think the most rel

Re: Restricted Execution of untrusted code

2008-10-31 Thread Emanuele D'Arrigo
On Oct 30, 8:50 pm, Aaron Brady <[EMAIL PROTECTED]> wrote: > Otherwise, you might be able to remove access to it by modifying > however it is the 'cust' list is obtained.  Perhaps you can use the > technique that's used to change the value of integers.  Keep us > posted.  Does this give you any ide

Re: Restricted Execution of untrusted code

2008-10-30 Thread Aaron Brady
I seem to understand that - > > comprehensive- safe/restricted execution of untrusted code in python > > is currently quite hard to achieve. > > > What if the safety requirements are a little relaxed though? All I'd > > want to prevent is for the code opening/damaging fi

Re: Restricted Execution of untrusted code

2008-10-30 Thread Aaron Brady
On Oct 30, 6:35 am, "Emanuele D'Arrigo" <[EMAIL PROTECTED]> wrote: > I noticed that this issue has been discussed in this newsgroup > periodically over the years and I seem to understand that - > comprehensive- safe/restricted execution of untrusted code in pytho

Restricted Execution of untrusted code

2008-10-30 Thread Emanuele D'Arrigo
I noticed that this issue has been discussed in this newsgroup periodically over the years and I seem to understand that - comprehensive- safe/restricted execution of untrusted code in python is currently quite hard to achieve. What if the safety requirements are a little relaxed though? All I&#