[ROOT] Carrot security?

From: Dubois, Richard (richard@SLAC.stanford.edu)
Date: Thu Aug 15 2002 - 08:02:25 MEST


 We in GLAST have been testing out the use of Carrot within our software test system - running automated builds and tests, and tracking them in an Oracle database and Root histogram files. With the Oracle connection, we can query the database and make plots on the fly; we can also locate histogram files and display them in the browser at will. All way cool.

 So, now we need to go to the computing center and ask for permission to expose the Carrot plugin to the world. The security dudes are (perhaps necessarily) anal - there are bad people out there - and tend to say 'no' to all requests.

 What is known about the security aspects of Carrot? Does it make the Apache webserver more vulnerable to exploits? If we have to prove to them that Carrot is safe, how do we go about it?

Thanks,

Richard
--
Richard Dubois
Stanford Linear Accelerator Center
650-926-3824
650-926-8616 (FAX)
richard@slac.stanford.edu
http://www.slac.stanford.edu/~richard



This archive was generated by hypermail 2b29 : Sat Jan 04 2003 - 23:51:04 MET