Beefy Boxes and Bandwidth Generously Provided by pair Networks
Problems? Is your data what you think it is?
 
PerlMonks  

Comment on

( #3333=superdoc: print w/ replies, xml ) Need Help??
You didn't understand the sentence you quoted, not at all, and your own first sentence has absolutely no logic.
I disagree.
You assumed that OS is one thing, which is a bad assumption. Then you reasoned: if it is not secure to call A, then A is not secure.
I still do, and here's why: From the point of view of an application programming language, the OS is - more or less - a black box that provides services.

The quote was 'Perl has bindings into OS calls that bypass OS security'.

Now, there are calls in every OS that bypass 'normal' security protocols, but it's up to the OS to make sure that the application calling those hooks have the appropriate permissions to do so. For instance, a user on unix can create a file/tree that no other user can read or modify. The exception is, that processes running as root can. That is not 'bypassing security', that's providing exceptions to the normal protocol for system administration purposes.

If there was a way for a normal user to modify another user's files (again, given restricted rwx permissions) that would be 'bypassing security'. It would also be bug in the OS and not any kind of problem with the programming language that exploits the bug.

The fact is that OS is not one thing, it is many things - many layers. It is insecure to call layer B if you bypass layer A that was supposed to provide security.
Again, if the OS is supposed to provide that security under certain conditions, it should make sure that that security is provided under those conditions. The OS should not blindly trust a program without elevated permissions to do the right thing, it should enforce its policies.

read my oppinion that I just provided as reply to one of tilly's post...
I would if I could find it.
really people should learn some philosophy and logic.
I have. If you want to convince me of your opinion, please explain your standpoint, because just asserting that I'm wrong and undereducated isn't going to convince me - and it's rude.


In reply to Re^3: How to answer "Perl is not secure" objections? by Joost
in thread How to answer "Perl is not secure" objections? by radiantmatrix

Title:
Use:  <p> text here (a paragraph) </p>
and:  <code> code here </code>
to format your post; it's "PerlMonks-approved HTML":



  • Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
  • Read Where should I post X? if you're not absolutely sure you're posting in the right place.
  • Please read these before you post! —
  • Posts may use any of the Perl Monks Approved HTML tags:
    a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
  • Outside of code tags, you may need to use entities for some characters:
            For:     Use:
    & &amp;
    < &lt;
    > &gt;
    [ &#91;
    ] &#93;
  • Link using PerlMonks shortcuts! What shortcuts can I use for linking?
  • See Writeup Formatting Tips and other pages linked from there for more info.
  • Log In?
    Username:
    Password:

    What's my password?
    Create A New User
    Chatterbox?
    and the web crawler heard nothing...

    How do I use this? | Other CB clients
    Other Users?
    Others scrutinizing the Monastery: (6)
    As of 2014-12-25 15:03 GMT
    Sections?
    Information?
    Find Nodes?
    Leftovers?
      Voting Booth?

      Is guessing a good strategy for surviving in the IT business?





      Results (160 votes), past polls