Not logged in
Log in now
Create an account
Subscribe to LWN
LWN.net Weekly Edition for May 16, 2013
A look at the PyPy 2.0 release
PostgreSQL 9.3 beta: Federated databases and more
LWN.net Weekly Edition for May 9, 2013
(Nearly) full tickless operation in 3.10
s/guess work/security through obscurity/
Database features do not excuse sloppy applications.
Posted Mar 31, 2006 6:39 UTC (Fri) by hppnq (guest, #14462)
Sure, if a gun is my only tool, I'd go through all that. But I'd rather whack the bastard with a newspaper.
Posted Mar 31, 2006 15:07 UTC (Fri) by GreyWizard (guest, #1026)
Posted Mar 31, 2006 15:36 UTC (Fri) by hppnq (guest, #14462)
Most or all security implementations heavily depend on defining proper interfaces to resources and making sure that access to resources is only possible through these interfaces.
It follows quite simply that it's wise to start off with as little resources and interfaces as possible if you care about security.
Posted Mar 31, 2006 22:17 UTC (Fri) by GreyWizard (guest, #1026)
Posted Apr 1, 2006 8:53 UTC (Sat) by hppnq (guest, #14462)
Now, you were the one that brought up the topics of sloppy programming and "security through obscurity", taking this discussion explicitly to the realm of the real world, where the perfect solution does not exist. You observed that database features are no excuse for bad programming, while I am of the opinion that they should not be an excuse.
In the real world resources are limited. At some point a decision will have to be made: is it good enough? Since security means nothing in the laboratory, and everything in the real world, this is a very important observation. This is also why I mention writing perfect code: it cannot be done, and the only way to avoid having to make suboptimal decisions is to remove the necessity of making those decisions. This is a classic trade-off between security and functionality.
Instead of having to protect features one does not need, it is better to not have them available in the first place. That of course leaves more resources available to get the actual job done: defining the correct interfaces to the functionality you want to provide or use and protecting those interfaces properly.
On the other hand, no database can provide protection from gaping security holes in external applications.
This is the same problem. Do take some time to think about it.
Practice What You Preach
Posted Apr 3, 2006 15:50 UTC (Mon) by GreyWizard (guest, #1026)
This is really not so complicated. Practice what you preach, especially with regard to taking the time to think about it.
Posted Apr 3, 2006 22:19 UTC (Mon) by hppnq (guest, #14462)
Posted Apr 4, 2006 2:58 UTC (Tue) by GreyWizard (guest, #1026)
Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds