[6001] in www-talk@info.cern.ch

home help back first fref pref prev next nref lref last post

Re: How about a Safe Virtual Machine?

daemon@ATHENA.MIT.EDU (Karl Auerbach)
Mon Oct 3 16:15:17 1994

Date: Mon, 3 Oct 1994 20:41:48 +0100
Errors-To: listmaster@www0.cern.ch
Errors-To: listmaster@www0.cern.ch
Reply-To: karl@cavebear.com
From: Karl Auerbach <karl@cavebear.com>
To: Multiple recipients of list <www-talk@www0.cern.ch>


 >   Agreed.  And I would like to go further -- in some contexts there are
 >   requirements that after a program has touched a certain class of file
 >   it is henceforth not allowed to write into another class of file.
 >   I.e. the program isn't going to be allowed to reclassify sensitive
 >   data from one level to another.
 >
 >   This is a fairly dynamic kind of safe environment, where the access
 >   rights depend on the sequence of previous actions.
 >
 >   (This kind of thing may reflect my work with governmental and military
 >   based security policies and may be too much for commercial use.
 >   However, I would submit for discussion, that there may be need for
 >   this kind of flexibility.)

Answering my own question -- I just remembered the stink when people
found out that Prodigy was snapshotting part of their computer's
memory and sending it back to the Sears/IBM servers.

Thus for example, I can conceive of a "safe" execution restriction
that says that once a script has read something from one of my local
files, it can no longer emit network traffic.

		--karl--


home help back first fref pref prev next nref lref last post