Pickled objects over the network

Steve Holden steve at holdenweb.com
Mon Jul 23 13:33:10 EDT 2007


Hendrik van Rooyen wrote:
> "Steve Holden" <steve at h..b.com> wrote:
> 
>> Yes.
> 
> Why?
> 
It's difficult to establish, and then correctly implement, almost any 
security protocol without leaving cracks that attackers can lever open 
and use to inject code into your process's memory space.

By all means go ahead and hack on pickle to do what you want to. Just 
don't claim your solution is secure without a thorough review.

regards
  Steve
-- 
Steve Holden        +1 571 484 6266   +1 800 494 3119
Holden Web LLC/Ltd           http://www.holdenweb.com
Skype: holdenweb      http://del.icio.us/steve.holden
--------------- Asciimercial ------------------
Get on the web: Blog, lens and tag the Internet
Many services currently offer free registration
----------- Thank You for Reading -------------




More information about the Python-list mailing list