At 7:38 AM -0400 10/6/05, John E. Malmberg wrote:
>
>On VMS, it is possible logical names that are not in the EXEC or higher 
>privileged mode should be considered tainted, and ones that in the EXEC mode 
>or higher should not be, if I understand what tainting is supposed to do.
>
>I do not think that Perl on VMS is making that distinction now, and I do not 
>know how to implement such a change.

If you hunt on the word "secure" in vms/vms.c:Perl_vmsstrenv() you'll
see that something very much like what you describe is already in
place.  There are various configure-time options controlling this as
well.

>
>Also the underlying C library still trusts the logicals names that could be 
>tainted, unless the Perl interpreter is installed with privilege and attempts 
>to dynamically load another image.  In that case logical names that could be 
>modified by non-privileged users are ignored.

The first thing Perl does when it starts up on VMS is disable image privileges.
-- 
________________________________________
Craig A. Berry
mailto:[EMAIL PROTECTED]

"... getting out of a sonnet is much more
 difficult than getting in."
                 Brad Leithauser

Reply via email to