[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Gnash-dev] Building in security
From: |
strk |
Subject: |
Re: [Gnash-dev] Building in security |
Date: |
Wed, 2 May 2007 14:01:30 +0200 |
On Wed, May 02, 2007 at 12:50:10PM +0100, Martin Guy wrote:
> I've added a couple of examples of exploits using net access to
> http://gnash.lulu.com/wiki/index.php/Security#Network_access
It seems all of those expoits are exploiting their security model.
By NOT implementing crossdomain.xml (or disabling whenever we'll implement)
we'll be the kind of all exploits for that.
In my opitnion the model is just bogus itself, so wouldn't go too deep
in trying to make it secure when it's security concept is just wrong.
--strk;
- Re[2]: [Gnash-dev] Building in security, Udo Giacomozzi, 2007/05/02
- Message not available
- Re[2]: [Gnash-dev] Building in security, Martin Guy, 2007/05/02
- Re: [Gnash-dev] Building in security, strk, 2007/05/02
- Re: [Gnash-dev] Building in security, Martin Guy, 2007/05/02
- Re: [Gnash-dev] Building in security, strk, 2007/05/02
- Re: [Gnash-dev] Building in security, Martin Guy, 2007/05/02
- Re: [Gnash-dev] Building in security,
strk <=
- Re[2]: [Gnash-dev] Building in security, Udo Giacomozzi, 2007/05/02
[Gnash-dev] Re: Building in security, Eric Hughes, 2007/05/02
Re: [Gnash-dev] Re: Building in security, Martin Guy, 2007/05/02
[Gnash-dev] Whitelists and Blacklists, Eric Hughes, 2007/05/02