Selfprogrammable MoinMoin

Executing arbitrary code (as a user, that's not our own) is the same as having a malicious user logged into your system. This not such a unusual situation. As long as there is no local exploit this user (wiki engine) can't do much damage on the filesystem. But there are some other points:

Please add more! Isn't that already enough? ;)

Ok. Let's assume that the test wiki is running on its own server. Then abuse of resources will only break the test wiki itself (what can be achieved easier). And let's assume we can reboot/reset the test wiki by an action in the edit wiki. This reboot/reset would terminate all (unknown) processes, clear /tmp, ... and restart the web server.

The only problem left is the web. There are lots of nasty things one can do with a server. To protect the world the test wiki server must be kept behind a firewall that will only pass the HTTP requests to it and doesn't let anything out, but the replies.

There is one danger that cannot be banned: The wiki engine can try to break the users web browser, by exploiting the numerous weaknesses of (e.g.) Internet Exploder. So everyone viewing the test wiki must know what he is doing (should he anyway if he is surfing the web).

Perhaps it is secure enough to run the testwiki in a virtual environment like User Mode Linux or VMware and using a RAM disk as file system. The host system could monitor the CPU usage and kill the process if something goes wrong. Users could restart it by an action in the edit wiki after cleaning up the mess.

edit wiki setup

Open questions:

test wiki setup

UML running a ramdisk that contains:

Open Questions:


CategoryFeatureRejected

MoinMoin: FeatureRequests/OldProposalSelfProgrammableMoin (last edited 2008-03-18 01:46:42 by JohannesBerg)