From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Message-ID: From: "Anssi Porttikivi" To: <9fans@cse.psu.edu> Subject: [9fans] Inferno plug-in security Date: Fri, 15 Jun 2001 14:47:38 +0300 Topicbox-Message-UUID: b9d38fb6-eac9-11e9-9e20-41e7f4b1d025 > like: what happens if someone puts a limbo app on a web page that takes > up no screen space, but dials out and does nefarious things (e.g. > taking part in a DDOS attack). Why don't you just give the plug-in user a simple configuration interface to control what directories the plug in is allowed to access, and in what ways (read/write/etc..)? This configuration could work dynamically and popped up when non-existing directories are trying to be opened during the execution of the plug-in. Any file system "object" which is too liberal in its standard form can be "stacked by"/"inherited to" a new restricted/augmented/modified version. A selection of these can be provided with the plug-in, programmed by the user, or done by a third party, maybe mounted from elsewhere in the network.