[Python-Dev] doc for new restricted execution design for Python
brett at python.org
Wed Jun 28 19:45:55 CEST 2006
On 6/28/06, Jim Jewett <jimjjewett at gmail.com> wrote:
> On 6/28/06, Brett Cannon <brett at python.org> wrote:
> > On 6/28/06, Guido van Rossum <guido at python.org> wrote:
> > > - File size should be rounded up to some block size (512 if you don't
> > > have filesystem specific information) before adding to the total.
> > Why?
> That reflects the amount of disk I no longer have available for other
> > - Total number of files (i.e. inodes) in existence should be capped,
> > If you want that kind of cap, just specify individual files you are
> > to let people open for reading; that is your cap. Only have to worry
> > this if you open an entire directory open for writing.
> Right, but on some systems, inodes are themselves a limited resource.
I'm not sure how common that is.
> > > - If sandboxed code is allowed to create directories, the total depth
> > > and the total path length should also be capped.
> > Once again, another one of those balance issues of where do we draw the
> > in terms of simplicity ... you need to allow use of
> > the platform's OS-specific module ( e.g., posix) to do it since open()
> > let you create a directory.
> I *think* this is to avoid security holes, and your solution of
> letting the open filter out bad names should be OK, but ... what if it
> isn't? What if cd then mkdir will let them create something too long?
> Do we have to wait for an OS patch?
Then isn't that a problem with cwd() and mkdir()?
And we can play the "what if" scenario forever with security. There is
always the possibility me or some originally trusted code is going to turn
out to be unsafe. This is why I am preferring an approach of just not
allowing the importation of possibly unsafe code unless you *really* trust
> > (I find reading about trusted and untrusted code confusing; a few
> > > times I've had to read a sentence three times before realizing I had
> > > swapped those two words. Perhaps we can distinguish between trusted
> > > and sandboxed? Or even native and sandboxed?)
> unlimited vs sandboxed?
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Python-Dev