Re: JEXL Security

2022-11-01 Thread Henri Biestro
27;ve been daft (on occasion hopefully) by lack of knowledge. A more secure default would avoid the daft configuration error, the one where you don't even know you are making a bad choice because you don't know enough yet. The goal is that we make it harder to ignore JEXL security configura

Re: JEXL Security

2022-10-31 Thread Mark Thomas
On 31/10/2022 14:03, Henri Biestro wrote: Let's restrict this discussion to the case of 'authenticated and authorised users' of an 'enterprise platform'. When we talk about 'unsafe input' vs 'safe input', I'm still confused about what this actually entails. Let's assume we want those users to

Re: JEXL Security

2022-10-31 Thread Henri Biestro
Let's restrict this discussion to the case of 'authenticated and authorised users' of an 'enterprise platform'. When we talk about 'unsafe input' vs 'safe input', I'm still confused about what this actually entails. Let's assume we want those users to enter a (JEXL) expression to express their

Re: JEXL Security

2022-10-26 Thread Mark Thomas
On 26/10/2022 08:58, Henri Biestro wrote: Fair points, thank you. They seem to lead into the point of view that JEXL (or any scripting solution?) should not expose any feature that could be considered security-related avoiding the CVE potential turmoils alltogether. Trusted sanitised input is

Re: JEXL Security

2022-10-26 Thread Henri Biestro
Fair points, thank you. They seem to lead into the point of view that JEXL (or any scripting solution?) should not expose any feature that could be considered security-related avoiding the CVE potential turmoils alltogether. Trusted sanitised input is expected and required so this is a moot d

Re: JEXL Security

2022-10-24 Thread Mark Thomas
On 24/10/2022 17:02, Henri Biestro (Apache) wrote: Hello Commons; JEXL-381 is an attempt at making JEXL's default more secure or at least less 'permeable' wrt to the application/platform/JVM/file-system/host that runs it. Based on JexlPermissions - a crude security visibility manager -, this res

JEXL Security

2022-10-24 Thread Henri Biestro (Apache)
Hello Commons; JEXL-381 is an attempt at making JEXL's default more secure or at least less 'permeable' wrt to the application/platform/JVM/file-system/host that runs it. Based on JexlPermissions - a crude security visibility manager -, this restricts the *default* behavior of what is visible to J