On Tuesday, March 6, 2012 at 7:11 PM, Russell Keith-Magee wrote:
> 
> On 07/03/2012, at 7:55 AM, Joey Espinosa wrote:
> 
> > I agree with you on some of your points. Security can be improved if people 
> > would email the support team INSTEAD OF filing a bug report (this goes for 
> > any project), so that the teams know about security bugs before anybody 
> > else finds them.
> > 
> > However, if there's a default setting or commonly set configuration choice 
> > that may be questionable for security, the best course of action would be 
> > to educate the Django developers and site maintainers on why it is or is 
> > not a good idea to implement. The Rails community has mentioned the Homakov 
> > vulnerability to the Rails team, to which their stance has been 
> > configuration over convention (you're responsible for your own security).
> > 
> > If there's a similar situation with the Django code, and it's something 
> > that's been put in intentionally by the Django team, then why not educate 
> > people about this? Better to have a resource somewhere where at least one 
> > Django developer on a team might have read a good security tip and share it 
> > with his team, than to have a potential attacker figure it out and exploit 
> > all of the Django sites that may have overlooked it. To put it in real life 
> > terms, you don't combat identity theft by not talking about it, you combat 
> > it by providing resources to educate the general public about how to 
> > protect themselves.
> 
> Completely agreed that then education is key. However, the key statement in 
> your reply is "something that's been put in intentionally by the Django 
> team". 
> 
> All I'm asking is before anyone starts broadcasting details about a 
> "vulnerability", that they take the time to contact the core team on 
> secur...@djangoproject.com (mailto:secur...@djangoproject.com) to determine 
> whether the code and it's side effects actually *are* intentional. You 
> *might* have discovered something that has been done intentionally, with full 
> knowledge of the consequences. It *might* be a case where we need to rely on 
> education -- improve Django's own docs, and encourage people like yourself to 
> blog about how to "do it right". However, it might also be a case where we 
> hadn't fully considered all the consequences, in which case, we'd like the 
> opportunity to address the problem before it becomes widespread public 
> knowledge.
> 
> In short -- err on the side of caution. It costs nothing to mail 
> secur...@djangoproject.com (mailto:secur...@djangoproject.com). If you have 
> found a serious problem, we'll give credit where it's due. If not, we'll let 
> you know you can start educating the world about what they're doing wrong.
> 
> Yours,
> Russ Magee %-)
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "Django users" group.
> To post to this group, send email to django-users@googlegroups.com 
> (mailto:django-users@googlegroups.com).
> To unsubscribe from this group, send email to 
> django-users+unsubscr...@googlegroups.com 
> (mailto:django-users+unsubscr...@googlegroups.com).
> For more options, visit this group at 
> http://groups.google.com/group/django-users?hl=en.
> 
> 

For what it's worth in the context of the Homakov exploit, this has been a well 
known vulnerability by the rails core for years
that they've basically said "not our problem, configure your app better" the 
entire time. I think that situation is the one that
Joey was referring too. 

-- 
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com.
To unsubscribe from this group, send email to 
django-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en.

Reply via email to