Right: there is no box root exploit issue, but if the ODB has a method that connects to your RDB and flushes out a table, in a non-transactional rdb, you are screwed if someone can, from an arbitrary client do this sort of thing. Also, I would think that ZEO CS->ZSS type traffic would be best run on its own switched VLAN for security and performance reasons. Sean -----Original Message----- From: Jerome Alet [mailto:alet@unice.fr] Sent: Friday, May 25, 2001 11:16 AM To: Bill Anderson Cc: zope@zope.org Subject: Re: [Zope] Re: ZEO Client space was: On Fri, May 25, 2001 at 11:39:54AM -0600, Bill Anderson wrote:
So, you give a user you presumably trust, ssh/ssl access to use ZShell. They comment this code out, or the code that even botehrs to check for permssion to do anything, and now they now '0WNZ Y0ur z0p3 sist3m'.
Except that in this particular case the user would also have to have got filesystem write access to the Extensions directory and a Manager role in /Control_Panel in order for him to be able to comment out the code and restart Zope, because ZShell is currently an external method. Anyway I tend to agree with you, it shouldn't be possible to bypass the security mechanism. bye, Jerome Alet _______________________________________________ Zope maillist - Zope@zope.org http://lists.zope.org/mailman/listinfo/zope ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope-dev )