9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: anothy@cosym.net
To: 9fans@cse.psu.edu
Subject: Re: [9fans] Inferno plug-in security
Date: Wed, 20 Jun 2001 09:57:25 -0400	[thread overview]
Message-ID: <20010620135735.D27D0199DD@mail.cse.psu.edu> (raw)

anssi wrote:
//Certainly, you are right.

oh, good.

//But the first and easy step for Inferno plug-in security is to let the Web
//browser user decide, what "objects" are bound to the name space.

i guess. i don't relly have any opinion as to which is more important or
should be there first, authentiction or authorization. it doesn't seem like
building a namespace defined per-module is really useful without reliably
knowing who that module is. well, there's always a default case, but as i
said earlier, that either ends up being too restrictive or too permissive.

still, you are correct in that the 'build a namespace' part of the problem is
an effective way to address the authorization issue, is a needed step, and
is probably more easialy solved.

eric wrote:
//...you are addressing a situation like a web page which may have all
//kinds of unknown modules...

yes, that's one example. but even a web page with one module has the
same issues behind it.

//...then i don't believe that signing is security. just because the module
//came from microsoft and was signed with the super-private microsoft
//key, doesn't mean that the module doesn't do things that you don't allow.

oh, more acuratly, if it came from microsoft, it probably means it _does_
do things i don't like. ☺ but sure, we don't want to allow _any_ module
signed by _anyone_ to do _anything_, just because it's signed. but i
probably trust modules written by me to do pretty much anything - make
network connections, write to my display, access local files, whatever.
same with modules written by VN, the Labs, or a few other individuals. on
the other hand, i probably don't trust modules from M$ or people i've
never heard of to do much - say, no network connections, no looking at
local files. in order to tell which permissions to use - which sandbox to
construct - i need to know who i'm dealing with.

of cource, this is much harder than simply defining a restrictive sandbox
for all modules to play in (which is basically what we've got now). maybe
a simpler alternative would be that when loading a module, a box pops up
with a series of check boxes for things like "make network connections"
and "access local files", determining what this module can do? simpler
than the user constructing a custom namespace for each module.
-α.



             reply	other threads:[~2001-06-20 13:57 UTC|newest]

Thread overview: 19+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2001-06-20 13:57 anothy [this message]
  -- strict thread matches above, loose matches on Subject: below --
2001-06-30  4:55 David Gordon Hogan
2001-06-20 12:01 Anssi Porttikivi
2001-06-20 12:08 ` Matt
2001-06-19 18:30 erik quanstrom
2001-06-19 17:12 anothy
2001-06-29 21:57 ` Boyd Roberts
2001-06-29 22:12   ` Matt
2001-06-29 22:30     ` Boyd Roberts
2001-06-29 22:48       ` Matt
2001-06-29 23:22         ` Boyd Roberts
2001-06-19 14:02 Anssi Porttikivi
2001-06-18 15:32 anothy
2001-06-18 14:53 Anssi Porttikivi
2001-06-15 12:26 rog
2001-06-15 11:47 Anssi Porttikivi
2001-06-17 15:08 ` Matt
2001-06-19 10:44 ` Rome Huang
2001-06-21 16:46 ` Rome Huang

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20010620135735.D27D0199DD@mail.cse.psu.edu \
    --to=anothy@cosym.net \
    --cc=9fans@cse.psu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).