We in GLAST have been testing out the use of Carrot within our software test system - running automated builds and tests, and tracking them in an Oracle database and Root histogram files. With the Oracle connection, we can query the database and make plots on the fly; we can also locate histogram files and display them in the browser at will. All way cool. So, now we need to go to the computing center and ask for permission to expose the Carrot plugin to the world. The security dudes are (perhaps necessarily) anal - there are bad people out there - and tend to say 'no' to all requests. What is known about the security aspects of Carrot? Does it make the Apache webserver more vulnerable to exploits? If we have to prove to them that Carrot is safe, how do we go about it? Thanks, Richard -- Richard Dubois Stanford Linear Accelerator Center 650-926-3824 650-926-8616 (FAX) richard@slac.stanford.edu http://www.slac.stanford.edu/~richard
This archive was generated by hypermail 2b29 : Sat Jan 04 2003 - 23:51:04 MET