At 11:08 PM 9/29/2001 -0400, Mathieu Bouchard wrote:
>On Fri, 28 Sep 2001, Dan Sugalski wrote:
> > *) Some opcodes will just not be available depending on the
> > characteristics you assign to the interpreter. File opens might be
> > forbidden, or code loading, or socket ops, or something. Settable as
> > needed by the interpreter creating the compartment.
>
>Why are files and sockets directly in the bytecode format instead of being
>classes that only happen to be written in C ?

File operations and network operations are fundamental to the interpreter, 
so dedicating opcodes to them makes sense. The I/O system's also fully 
async (where possible, and looking async where it isn't) so we need some 
good hooks into the interpreter for that anyway.

> > I won't claim it'll be bullet-proof--as long as you can call out to C code
> > it's ultimately unsafe--but we'll do our best to make sure things are as
> > secure as a bunch of non-security folks can make it.
>
>as long as you can put a fence on which C plugins may be loaded you have a
>chance to be safe. when a ".so" is required, check that it's on a list of
>so's that are allowed by the sandbox config.

Ah, the installed images list. Yep, that's being considered too. :)


                                        Dan

--------------------------------------"it's like this"-------------------
Dan Sugalski                          even samurai
[EMAIL PROTECTED]                         have teddy bears and even
                                      teddy bears get drunk

Reply via email to