Hi Vailton,

>>  * contrib/hbnetio/utils/netiocmd.prg
>>    ! Fixed remote execution protection to work even when
>>      the source was compiled from another directory.
>>    ; QUESTION: Is there a better way to make this kind of
>>                protection? Current system will break if
>>                the source filename of the caller happens to
>>                change in the future.
> 
> I'm sure it is not. But as I would like to separate these commands in
> a separate source, this was my first idea. If only validate the
> routine name calling instead of the name + source is already seen as
> something safe, we can simplify the process of validation.

I don't know, to me it looks like a very light 
protection. I feel that _any_ hbnetiosrv setups 
with unlimited RPC enabled is inherently unsafe 
with or without such tricks. After all the protected 
function is just one more public function calling 
other public functions, which are available anyway.
If harm can be done, it can be done regardless of 
protection. For example client could call __QUIT() 
function anytime to shutdown the server. It's 
pretty difficult to create an executable to sort 
out all potentially harmful public function which 
gets linked via various dependency paths.

What do you think?

Brgds,
Viktor

_______________________________________________
Harbour mailing list (attachment size limit: 40KB)
Harbour@harbour-project.org
http://lists.harbour-project.org/mailman/listinfo/harbour

Reply via email to