473,659 Members | 2,663 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

rexec and bastion

Cited from Python-doc ( v.2.3 )

[Warning: In Python 2.3 these modules have been disabled due to
various known and not readily fixable security holes. The modules are
still documented here to help in reading old code that uses the rexec
and Bastion modules.]

My question about rexec and bastion may be anachronistic but I did not
found much explanation, why rexec and bastion are swiss cheese? It may
be helpfull to resume the problems to learn from them.

Ciao
Kay
Jul 18 '05 #1
2 1726
Kay Schluehr wrote:
Cited from Python-doc ( v.2.3 )

[Warning: In Python 2.3 these modules have been disabled due to
various known and not readily fixable security holes. The modules are
still documented here to help in reading old code that uses the rexec
and Bastion modules.]

My question about rexec and bastion may be anachronistic but I did not
found much explanation, why rexec and bastion are swiss cheese? It may
be helpfull to resume the problems to learn from them.


is google down today?

http://www.amk.ca/python/howto/rexec/rexec.html

says

For discussion of the problems with rexec, see the python-dev threads
starting at the following URLs:
http://mail.python.org/pipermail/pyt...er/031160.html
and http://mail.python.org/pipermail/pyt...ry/031848.html

</F>

Jul 18 '05 #2
> is google down today?

http://www.amk.ca/python/howto/rexec/rexec.html


No, I'm down today ;)

Thx.
Kay
Jul 18 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
2211
by: Colin Coghill (SFive) | last post by:
Hi, a year or so back some students of mine and I wrote some software which made use of the rexec module to run untrusted user code relatively safely. (We were creating a prototype of a mobile-code style app) I'm now working on another project which will need to be able to do something similar, and I noticed that rexec and Bastion have been withdrawn for (in)security reasons. I've searched fairly hard, and have been unable to find any...
13
3777
by: Rainer Deyke | last post by:
Now that rexec is gone, is there any code or information available on executing Python in a restricted environment? And before I roll my own solution, exactly where the security holes in rexec anyway? (I know one way of getting a restricted environment: butcher the Python interpreter by removing everything that's even remotely dangerous, use Python only for restricted execution, and do everything else in a C++ program that embeds the...
9
4145
by: Huaiyu Zhu | last post by:
What is the prefered way to eval a string like "('a', 1)"? These strings are representations of simple objects of type int, str, or dict, tuple or list made of them. I do not want to use naked eval in case I run the script on a wrong file that happens to contain Python code. Previously I used the following from rexec import RExec r_eval = RExec().r_eval
1
1837
by: Paul Miller | last post by:
I came across this recipe on the Python Cookbook site: http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/286134 As written, it allows evaluation of either constants or more general expressions involving constants and operators (but not function calls). I haven't thoroughly tested it for security, but it at least passes the smoke test. Assuming that this can either be demonstrated to be
5
1763
by: JoeBrain00 | last post by:
Sorry if this is in the wrong forum, I couldn't find another place for it... Does anyone use Visual Integration Studio? ( http://www.crossrhoades.com ) I am attempting to load some Oracle data using SQL*Loader but my Oracle server is on a UNIX system, so I'd like to telnet or rexec the sqlloader command to unix and wait for it to complete in my data integration process.
7
1327
by: Mark Fink | last post by:
Hi there, I at the moment port a library from Python to Jython (at lease I try to do so :-))). The library uses the Rexec to form a type adapter to cast parameters given as text into the according Jython type. I learned rexec is not available in Jython. Is something that is commonly used in Jython for such tasks available? In general: how do I find such information by myself? Best Regards, Mark
2
1415
by: Erik Johnson | last post by:
The documentation for these two modules says that they were disabled in Python 2.3 due to security holes not easily fixable. I have not worked with them, but I can still import them under Python 2.4, so I'm not clear on whether the security problems were fixed in Python itself, or whether the modules remain deprecated (disabled?)? How are/were they actually disabled? Any place that documents what the problems are? Any alternatives? ...
3
1380
by: Paul Miller | last post by:
Bastion and rexec have been deprecated since Python 2.2, so it seems we (the Python community) have gotten along well enough without them. Have these modules not been reimplemented because: a) There are no valid use cases for them. b) Doing so would be difficult and prone to breakage as new features are introduced into the language. c) Nobody has any idea how to do it. d) Nobody cares. e) Guido thinks it's a bad idea.
1
2835
by: datactrl | last post by:
Hi, all I'd like to execute a remote program in Windows operation system with rexec in PHP. Is there a rexec module PHP instead of using PHP to create a process to run rexec, just like CGI? Or is there any way to speed up it when doing like that? Thank you in advance! Jack
0
8850
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8523
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8626
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7355
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6178
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4175
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4334
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2749
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1737
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.