REBOL 3 Docs | Guide | Concepts | Functions | Datatypes | Errors |
TOC < Back Next > | Updated: 3-Aug-2010 Edit History |
Set security policies (use SECURE help for more information).
Arguments:
policy [word! lit-word! block! unset!] - Set single or multiple policies (or HELP)
See also:
The secure function controls file, network, evaluation, and all other external access and related policies.
The function uses a simple dialect to specify security sandboxes and other options that allow or deny access. You can set different security levels and multiple sandboxes for networking and specific files and directories.
The secure function gives you control over policies for:
file | file read, write, and directory creation and listing |
net | read and write access to the network interfaces |
eval | limit the number of evaluation cycles allowed (always quits) |
memory | limit the amount of memory used (always quits) |
secure | control changes to security policies with secure |
protect | protecting and hiding values with protect |
debug | use of debug-related functions: trace and stack |
envr | getting OS/shell environment variables with get-env |
call | launching external programs with call |
browse | opening the web browser with browse |
extension | importing extensions (may contain native code) |
A list of these for your current release can always be obtained with the line:
secure query
(Which will also show their current policy settings.)
The argument to the secure function can be a word or a block.
word | a general, top-level action such as setting global security levels to allow or deny all access. It can also be used to query the current security policies. |
block | specify separate security policies for files, directories, networking, extensions, debugging, and other features. |
If the argument is a word, it can be:
help | summarize what policies can be set |
query | show current policies |
allow | remove all policies (no security) |
none | the same as allow (no security) |
ask | require user permission on all policies |
throw | throw an error for all violations |
quit | exit the program for all violations |
For example, developers often type:
secure none
to disable all security when developing new programs. However, use this with care. Do not run (or do) any programs other than those that you trust.
Another example is:
secure quit
the program will quit immediately if any security violation occurs. Of course, this is a little extreme, and you won't get far. You'll want to specify a block for greater control. See the next section.
To provide more detailed security, use a block:
secure [ net quit file ask %./ allow ]
This block will:
As you can see, the security dialect consists of a block of paired values. The first value in the pair specifies what is being secured (file or net), and the second value specifies the level of security (allow, ask, throw, quit). The second value can also be a block to further specify read and write security.
The security policies are:
allow | removes all READ and/or WRITE restrictions. |
ask | restricts immediate READ and/or WRITE access and prompts the user for each access attempt, requiring approval before the operation may be completed. |
throw | denies READ and/or WRITE access, throwing an error when a restricted access attempt is made. |
quit | denies READ and/or WRITE access and quits the script when restricted access is attempted. |
For example, to allow all network access, but to quit on any file access:
secure [ net allow ;allows any net access file quit ;any file access will cause the program to quit ]
If a block is used instead of a security level word, it can contain pairs of security levels and access types. This lets you specify a greater level of detail about the security you require.
The access types allowed are:
read | controls read access. |
write | controls write, delete, and rename access. |
execute | controls execute access. |
all | controls all access. |
The pairs are processed in the order they appear, with later pairs modifying the effect of earlier pairs. This permits setting one type of access without explicitly setting all others. For example:
secure [ net allow file [ ask all allow read quit execute ] ]
The above sets the security level to ask for all operations except for reading (which is allowed).
This technique can also be used for individual files and directories. For example:
secure [ net allow file quit %source/ [ask read] %object/ [allow all] ]
will prompt the user if an attempt is made to read the %source directory, but it will allow all operations on the %object directory. Otherwise, it uses the default (quit).
If no security access level is specified for either network or file access, it defaults to ASK. The current settings will not be modified if an error occurs parsing the security block argument.
The secure function returns the prior security settings before the new settings were made. This is a block with the global network and file settings followed by file or directory settings. The word query can also be used to obtain the current security settings without modifying them:
probe secure query [file allow net allow ...]
Using query, you can modify the current security level by querying the current settings, modifying them, then using the secure function to set the new values.
Once you have your security policies set, it's a good idea to secure the secure function to prevent modifications. This is done in the same way as other policies.
For example:
secure [secure quit]
will cause your program to immediately quit if any other code tries to modify the security policies.
Note that lowering the security level produces a change security settings requestor to the user. The exception is when the REBOL session is running in quiet mode which will, instead, terminate the REBOL session. No request is generated when security levels are raised. Note that the security request includes an option to allow all access for the remainder of the scripts processing.
To disable all security on startup, you can start REBOL with:
rebol -s args...
This policy allows open access for everything.
You can also use the --secure argument to specify any other default security level on startup.
You can set secure to limit interpreter evaluation. This feature allows you to restrict server scripts (such as CGI) to a specific evaluation length to prevent runaway programs.
This example sets the limit to 50000 cycles, after which the program will immediately quit (the default behavior):
>> secure [eval 50000] >> loop 100000 [next "test"] <quit>
Also, for debugging you can use the more detailed form of
>> secure [eval [throw 50000]] >> loop 100000 [next "test"] ** Access error: security violation: eval ** Where: loop ** Near: loop 100000 [next "test"]
You can continue your debugging at the console, but secure will trap again on the next evaluation sample. To disable that behavior:
>> secure [eval allow]
When tuning your program, to determine how many cycles your code needs, you can use:
>> stats/evals == 50403
However, add to that number a good margin of error for special conditions within your code. In many cases you will want to make it ten or twenty times larger, just to be sure.
A few notes:
You can set secure to limit the amount of memory allocated by your program. This feature allows you to restrict server scripts (such as CGI) to a specific memory usage to prevent runaway programs.
>> secure [memory 2'000'000] >> strings: [] >> loop 100000 [append strings make string! 100'000] <quit>
This feature works the same way as the evaluation limit described above. Read that section for more details.
To determine how much memory your program has currently used:
>> stats == 913616
The number is shown in bytes.
In addition, it should be noted that the memory limit applies to actual memory consumed. Due to automatic memory allocation (garbage collection) it is possible for a program to run a indefinite amount of time on a specific amount of memory.
The memory limit can be set only once and cannot be reset. However, for debugging after an eval THROW exception, you can use
secure [memory allow]
TOC < Back Next > | REBOL.com - WIP Wiki | Feedback Admin |