On Apr 10, 2009, at 9:25 AM, Martijn Faassen wrote:

> Hi there,
> One fundamental question about this that I have is why we want to
> protect the user against such loopholes anyway?
> Isn't zope.security a protection system against *accidental*  
> mistakes in
> building secure applications?


> I.e. I call a method and then I find out I
> have no such access. Do we really need to protect the developer  
> against
> more arcane workarounds?
> If I *want* to work around the security system deliberately I can  
> simply
> remove the security proxy and be done with it. It's not like the  
> system
> is protecting against this anyway.
> Protecting against workarounds is useful if you allow through the web
> manipulation of code itself. But who is actually doing this?

The purpose of the protection system is to protect an application  
against untrusted code provided by people other than the application  
develoer.  If an application has no untrusted code, then the  
protection system isn't necessary. I'll guess that 99% of applications  
don't support untrusted code and don't need the Zope protection  
system(s).  The applications people build with Grok probably fall in  
this category, or one would hope. :)

There are some applications, such as Zope 2, Plone, and many of our  
(ZC's) applications that support untrusted code and, for these  
systems, the protection system is critical.  It doesn't protect the  
application developer from herself, it protects her from the people  
writing the untrusted code.

(Note that, in some ways, HTTP requests represent untrusted code.   
This case can often be handled by simple resource-protection schemes,  
although some applications can still benefit from the Zope 3  
protection scheme, which can help mediate access to content when fine- 
grained control is needed.)


Jim Fulton
Zope Corporation

Zope-Dev maillist  -  Zope-Dev@zope.org
**  No cross posts or HTML encoding!  **
(Related lists - 
 http://mail.zope.org/mailman/listinfo/zope )

Reply via email to