Greetings,

I have been working on taking over _why's Try Ruby program.
Essentially, it is a webpage that employs ajax to talk to a ruby interpretor
on a server to give you an interactive shell.
This interactive shell would come with lessons that would teach basic ruby
scripting.

The trouble I am running into is deciding how to best secure this program.
I noticed that it allows for the use of the system method; and yes I have
been able to read /etc/passwd.

I am not entirely sure how to disable that at the interpretor level, short
of ripping it out of ruby, which seems like it might break other I/O
functions.

Instead, I have come to the idea of just simply making a minimal permission
user for apache and ruby.
In addition to that, create a chroot. I am tempted to then stick that inside
a vm, but I am not sure if that is overkill.

Simply not hosting this program is a non starter, but I also do care about
making sure I am not deploying a huge security hole on my server.

What other suggestions do any of you have in regards to responsibly
deploying such a potential high risk program.
Is a tripwire program also in order, and if so, how would you configure it?

Thanks,
Andrew

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"NLUG" group.
To post to this group, send email to nlug-talk@googlegroups.com
To unsubscribe from this group, send email to 
nlug-talk+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/nlug-talk?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to