At 8:24 AM -0500 on 12/9/96, Chris Nandor wrote: }At 19:06 12/6/96, ??? wrote: }>On Fri, 6 Dec 1996, Clinton MacDonald wrote: }>> AppleScript is a marvelous and robust scripting language for driving }>> applications (including the Finder) on your own desktop. Matthias is }>> working to incorporate AppleScript into MacPerl for that reason. }> }>To introduce security holes onto people Macintoshii ;-) } }I don't see how anyone could crack any of my MacPerl or AppleScript scripts }on my Mac through the web to do anything evil. I am much more worried }about the risks posed by my Solaris programs, for one simple reason: }command line interface. Now, true, the MacPerl interpreter accepts text }commands, but only from within a script or app ... you can't write [rm *.*] }or [MacPerl -e 'unlink "Macintosh HD:System Folder"'] and have it do }anything meaningful. You need to get inside the app. AppleScript is even }more difficult to crack, because you have to compile your script first. }Now, it is possible to write a script that erases your hard drive and make }it publically accessible, but that would not be a security hole caused by }AppleScript or MacPerl any more than it would be the fault of your car }alarm if you left the car unlocked with keys in the ignition ... Actually, there are a couple of different ways I know that Applescript could be a major security hole, but unlike our friendly purveyor of paranoia, I'll say more than just "Think about it". First, someone could be running Peter Lewis' Script Daemon. It's always hung on my Macintosh the times I've tried it, but it presumably runs on some subset of Macs, and it gives, effectively, a superuser level command line interface on a Mac. The other way is a suggestion made a year or so ago to implement an "ascrpt:" pseudo URL, with imbedded Applescripts in Web pages that would run on the client machine. The same thing was proprosed for Usertalk (and may still be implemented in Frontier), and I believe I've even seen people propose csh: and perl: URL's. The security holes here are not hard to imagine ("Click here to make a major change in your life!"). But I agree, you damn well better worry more about Solaris than your Mac, especially if you're running known security holes like sendmail < 8.8.4. CGI's on a Web page written in Perl are much less of a problem. } }>> *JavaScript*...now that might be a security risk, but I think the people }>> at Sun (and Netscape) are trying to eliminate those features as rapidly as }>> possible. }> }>Colour me doubtful on that count. If anything they've work towards the }>exact opposite. } }This is a side issue, but I know of no existing JavaScript security hole of }any significance. There have been several holes found in Netscape's implementation of JavaScript, and CERT <http://www.cert.org> recommends keeping it shut off. I always do. You should be able to track down the details at CERT's web site. } }Fighting paranoia where it exists ... A little paranoia is healthy, but unfortunately, when it comes to security, the non-experts always seem to be worried about the wrong things... } }#================================================================ }perl -e 'srand();if(rand>.5){$i=0;foreach(@ARGV){@$i=split(//);$z }[$i]=0;foreach(@$i){$s[$i][$z[$i]]=$_;$z[$i]++;}$i++;}foreach(@s) }{foreach(@$_) {print}print" ";$_++}}else{print(join(" ", @ARGV))} }print"\n"' McClellan Clan Motto: Think On } }Chris Nandor pudge@pobox.com }PGP Key 0xB76E72AD http://pudge.net/ -------- Paul J. Schinder NASA Goddard Space Flight Center Code 693 Greenbelt, MD 20770 schinder@pjstoaster.pg.md.us