← Back to team overview

phatch-dev team mailing list archive

Re: Phatch for Geeks

 

Erich

That's very interesting. I don't know anything about keyczar - however it sounds like the right kind of thing.
Of course, we're jumping ahead (although now's the time to think for  
the future).  If we arrive at a time when people are publishing  
Phatch actions (or actionlists), I think we'll have to consider  
something like this.
Until then, I think what Stani's added here is really good.

Robin
http://www.clanmills.com





On Jun 17, 2009, at 7:47 AM, Erich Heine wrote:

Robin,

Thanks for expanding, your point makes much more sense now (and seems much more reasonable :P ). There are some responses below (after the quote):
On Wed, Jun 17, 2009 at 9:10 AM, Robin Mills <robin@xxxxxxxxxxxxx>  
wrote:
However it might be nice if Python was able to refuse to run  
scripts which don't have a valid digital certificate - and that  
would make "alien" scripts less dangerous.
So it all adds up to "The issue is with Python, not Phatch".

We could put something in to check scripts against a "verified good" phatch "app store". Its not that hard to do an hmac thats digitally signed with the phatchdev private key. This is close to trivial to write, particularly if we use a nice framework like keyczar from google. Of course then we can only verify official action lists -- which is a game we may not want to play.
As for where the issue lies id put equal parts of it in phatch,  
python, and the current computing model.
Phatch -- we want to run arbitrary external scripts and programs  
which is isomorphic to running untrusted code. This desire  
introduces the issue to begin with.
Python -- no buitin code signing, no restricted shell execution  
environment.
Computing model: too much power to each process/program, no good  
way of reliably restricting things, too much interdependence  
resulting in all or nothing permissions models in the real world.
Regards,
Erich






Follow ups

References