On 7/7/06, Talin <[EMAIL PROTECTED]> wrote:
Brett Cannon wrote:
> On 7/6/06, Talin <[EMAIL PROTECTED]> wrote:
>> And if we can call it for every operation, then we don't have to spend
>> time hunting down all of the possible loopholes and ways in which 'file'
>> or other restricted objects might be accessed.
>
> Not true.  You have to set this object restriction flag, right?  What
> happens if you don't set it on all of the proper classes/types?  You end up
> in the exact same situation you are with crippling; making sure you cover
> your ass with what you flag as  unsafe else you risk having something get
> passed you.

But that's a much simpler problem.

With the restricted flag, it isn't just *your* code that is prevented
from using 'file' - it's *all* code. Only approved gateways that remove
the restriction (by setting the interpreter state) can perform
operations on file objects without blowing up.

This means that if you call some random library function that attempts
to open a file, it won't work, because the random library function is
still running in restricted mode.

Right, but that happens with either approach being proposed anyway.

Similarly, if you have a reference to some externally created object
that has a reference to a file (or the file class) somewhere in it's
inheritance hierarchy, any attempt to access that object will fail.

Without this, you would have to chase down every bit of library code
that opens file, or has a reference to a file.

Not true.  With the library code running under a sandboxed interpreter the checks by either implementation will still be in effect.  And if a proxy is returned by open() instead of 'file' with stuff crippled then the worries alleviated even further.

What I am proposing shares some aspects of both the crippling and the
capability model:

It's similar to crippling in the sense that you're protecting the object
itself, not access to the object. So you avoid the problem of trying to
figure out all of the possible ways an object can be accessed.

However, where it resembles capabilities is that its an 'all or nothing'
approach - that is, you either have access to file, or you don't. Unlike
the crippling model where fine-grained access control is implemented by
modifying individual methods of the crippled object, in this scheme we
cripple the object *entirely*, and then provide fine-grained access
control via wrappers. Those wrappers, in turn, act just like
capabilities - you can have different wrappers that have different sets
of access permissions.

So it provides the advantage of the capability approach in that the set
of restrictions can be extended or modified by writing new wrappers.

Thus, by providing an extremely simple but unbreakable check at the
interpreter level, we can then write classes that build on top of that a
richer and more sophisticated set of permissions, while still
maintaining a strong barrier to unauthorized actions.

 

I guess I am just not seeing where your approach is better than preventing the constructor in 'file' and having open() return the 'file' object or proxy object.  With your approach 'file' would be flagged, but with the other you just put the same check in 'file's constructor.  With both you would probably also want open() to be a factory function anyway.  So I don't see where you gain simplicity or more security.  It seems like you are pushing the check into the eval loop, but you still require the flagging of objects as unsafe.  Going with the other two proposals you don't burden the eval loop with the check but the objects that you would have flagged in the first place.

It just seems like we are pushing around the flagging of unsafe stuff and that doesn't feel like it buys us much.

-Brett
_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
http://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
http://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to