Re: Advice on project logo

2019-09-30 Thread Sally Khudairi
Couldn't resist 

https://twitter.com/alanparsons/status/1178469148751466496?s=19

...no idea how it appeared in my timeline... 

- - - 
Vice President Marketing & Publicity
Vice President Sponsor Relations
The Apache Software Foundation

Tel +1 617 921 8656 | s...@apache.org


On Thu, Sep 19, 2019, at 19:10, Sally Khudairi wrote:
> Rob: I've had "Eye In The Sky" in my head for the past 5 days ... 
> 
> Thanks for the ear worm --it's a sign :^)
> 
> But I concur: no "Project" is needed in the logo here.
> 
> - - -
> Vice President Marketing & Publicity
> Vice President Sponsor Relations
> The Apache Software Foundation
> 
> Tel +1 617 921 8656 | s...@apache.org
> 
> 
> On Sun, Sep 15, 2019, at 10:47, Rob Tompkins wrote:
>> 
>> 
>> 
>> On Sep 15, 2019, at 8:10 AM, Gary Gregory  wrote:
>>> I do not think we need "Project", we're not a 70s progrock band ;-)
>> 
>> I like the Alan Parsons Project, a little :-P
>>> 
>>> On Sun, Sep 15, 2019, 07:45 Rob Tompkins  wrote:
>>>> Here’s a potential logo that I mocked up and sent to Kenneth. Does anyone 
>>>> have any opinions on this? I felt like something similar to the one that 
>>>> Sally sent across for the HTTP project seemed reasonable. 
>>>> 
>>>> Also, I think that it’s not exactly adherent to the style guide and that 
>>>> Kenneth plans on putting something together that’s analogous and adhere’s 
>>>> to the style guide. 
>>>> 
>>>> Thoughts? -Rob
>>>> 
>>>> 
>>>> 
>>>>> On Sep 9, 2019, at 3:17 PM, Gary Gregory  wrote:
>>>>> 
>>>>> The KISS solution would be to get "Central" to produce not just the 
>>>>> Commons
>>>>> logo but one for each component and be done. The even simpler path is to
>>>>> forgo component specific logos, especially since Commons is just one 
>>>>> Apache
>>>>> project. I like simpler...
>>>>> 
>>>>> Gary
>>>>> 
>>>>> On Mon, Sep 9, 2019, 15:08 Rob Tompkins  wrote:
>>>>> 
>>>>>> 
>>>>>> 
>>>>>>> On Sep 9, 2019, at 11:31 AM, Gilles Sadowski 
>>>>>> wrote:
>>>>>>> 
>>>>>>> Hi.
>>>>>>> 
>>>>>>> Le lun. 9 sept. 2019 à 12:35, Sally Khudairi  a écrit :
>>>>>>>> 
>>>>>>>> Thank you, Gilles.
>>>>>>>> 
>>>>>>>> I'm copying Kenneth Paskett, creative lead from Central Services. I was
>>>>>> talking to him about this opportunity yesterday: we will be happy to
>>>>>> explore options for a future design.
>>>>>> 
>>>>>> Just curious, who on this transmission is at ApacheCon this week. Having
>>>>>> worked with Sally in the past on an ad-hoc logo for the DC road show
>>>>>> earlier this year, I could sit down with her and see if we can get
>>>>>> something analogous to what we have in place currently that satisfies
>>>>>> everyone (granted my designs tend to be minimalist in nature).
>>>>>> 
>>>>>> Thoughts?
>>>>>> 
>>>>>> -Rob
>>>>>> 
>>>>>>>> 
>>>>>>>> I'm not saying "don't use anything that remotely looks like the
>>>>>> feather". It's important that if we choose to use an ASF-feather-inspired
>>>>>> motif that it doesn't look like it's a "broken" version of the original.
>>>>>>> 
>>>>>>> It was certainly not the intention.
>>>>>>> It is difficult/impossible to argue on things that boil down
>>>>>>> to a matter of taste or arbitrary policy (like the kinds of
>>>>>>> reuse that are allowed and not by the rights owner).
>>>>>>> 
>>>>>>>> Ways around that issue could involve the shape or color of the feather,
>>>>>> among other adjustments.
>>>>>>> 
>>>>>>> Exactly what I meant: IMHO those changes are more "broken"
>>>>>>> than a rotation. ;-)
>>>>>>> [But if they are allowed, then fine.]
>>>>>>> 
>>>>>>>> Thank you and the community 

Re: Advice on project logo

2019-09-19 Thread Sally Khudairi
Rob: I've had "Eye In The Sky" in my head for the past 5 days ... 

Thanks for the ear worm --it's a sign :^)

But I concur: no "Project" is needed in the logo here.

- - - 
Vice President Marketing & Publicity
Vice President Sponsor Relations
The Apache Software Foundation

Tel +1 617 921 8656 | s...@apache.org


On Sun, Sep 15, 2019, at 10:47, Rob Tompkins wrote:
> 
> 
> 
> On Sep 15, 2019, at 8:10 AM, Gary Gregory  wrote:
>> I do not think we need "Project", we're not a 70s progrock band ;-)
> 
> I like the Alan Parsons Project, a little :-P
>> 
>> On Sun, Sep 15, 2019, 07:45 Rob Tompkins  wrote:
>>> Here’s a potential logo that I mocked up and sent to Kenneth. Does anyone 
>>> have any opinions on this? I felt like something similar to the one that 
>>> Sally sent across for the HTTP project seemed reasonable. 
>>> 
>>> Also, I think that it’s not exactly adherent to the style guide and that 
>>> Kenneth plans on putting something together that’s analogous and adhere’s 
>>> to the style guide. 
>>> 
>>> Thoughts? -Rob
>>> 
>>> 
>>> 
>>>> On Sep 9, 2019, at 3:17 PM, Gary Gregory  wrote:
>>>> 
>>>> The KISS solution would be to get "Central" to produce not just the Commons
>>>> logo but one for each component and be done. The even simpler path is to
>>>> forgo component specific logos, especially since Commons is just one Apache
>>>> project. I like simpler...
>>>> 
>>>> Gary
>>>> 
>>>> On Mon, Sep 9, 2019, 15:08 Rob Tompkins  wrote:
>>>> 
>>>>> 
>>>>> 
>>>>>> On Sep 9, 2019, at 11:31 AM, Gilles Sadowski 
>>>>> wrote:
>>>>>> 
>>>>>> Hi.
>>>>>> 
>>>>>> Le lun. 9 sept. 2019 à 12:35, Sally Khudairi  a écrit :
>>>>>>> 
>>>>>>> Thank you, Gilles.
>>>>>>> 
>>>>>>> I'm copying Kenneth Paskett, creative lead from Central Services. I was
>>>>> talking to him about this opportunity yesterday: we will be happy to
>>>>> explore options for a future design.
>>>>> 
>>>>> Just curious, who on this transmission is at ApacheCon this week. Having
>>>>> worked with Sally in the past on an ad-hoc logo for the DC road show
>>>>> earlier this year, I could sit down with her and see if we can get
>>>>> something analogous to what we have in place currently that satisfies
>>>>> everyone (granted my designs tend to be minimalist in nature).
>>>>> 
>>>>> Thoughts?
>>>>> 
>>>>> -Rob
>>>>> 
>>>>>>> 
>>>>>>> I'm not saying "don't use anything that remotely looks like the
>>>>> feather". It's important that if we choose to use an ASF-feather-inspired
>>>>> motif that it doesn't look like it's a "broken" version of the original.
>>>>>> 
>>>>>> It was certainly not the intention.
>>>>>> It is difficult/impossible to argue on things that boil down
>>>>>> to a matter of taste or arbitrary policy (like the kinds of
>>>>>> reuse that are allowed and not by the rights owner).
>>>>>> 
>>>>>>> Ways around that issue could involve the shape or color of the feather,
>>>>> among other adjustments.
>>>>>> 
>>>>>> Exactly what I meant: IMHO those changes are more "broken"
>>>>>> than a rotation. ;-)
>>>>>> [But if they are allowed, then fine.]
>>>>>> 
>>>>>>> Thank you and the community for your trust. We look forward to working
>>>>> with you.
>>>>>> 
>>>>>> Hopefully, preferences will be collected in the thread which I
>>>>>> mentioned in the previous message, and the community can
>>>>>> converge on a few ideas to help with the design.
>>>>>> 
>>>>>> Best regards,
>>>>>> Gilles
>>>>>> 
>>>>>>> 
>>>>>>> Best,
>>>>>>> Sally
>>>>>>> 
>>>>>>> - - -
>>>>>>> Vice President Marketing & Publicity
>>>>>>> Vice President Sponsor Re

Re: Advice on project logo

2019-09-09 Thread Sally Khudairi
Thank you, Gilles. 

I'm copying Kenneth Paskett, creative lead from Central Services. I was talking 
to him about this opportunity yesterday: we will be happy to explore options 
for a future design. 

I'm not saying "don't use anything that remotely looks like the feather". It's 
important that if we choose to use an ASF-feather-inspired motif that it 
doesn't look like it's a "broken" version of the original. Ways around that 
issue could involve the shape or color of the feather, among other adjustments. 

Thank you and the community for your trust. We look forward to working with 
you. 

Best, 
Sally 

- - - 
Vice President Marketing & Publicity
Vice President Sponsor Relations
The Apache Software Foundation

Tel +1 617 921 8656 | s...@apache.org

On Mon, Sep 9, 2019, at 03:22, Gilles Sadowski wrote:
> Hello.
> 
> Le sam. 7 sept. 2019 à 13:29, Sally Khudairi  a écrit :
> >
> > Thank you, Gilles. I appreciate you reaching out.
> >
> > Normally I encourage PMCs to not re-orient or "spindle" the feather where 
> > possible, but I understand that some legacy logos have a bit of a problem 
> > with positioning. For example, the Apache HTTP Server logo:
> >
> >  - original logo https://twitter.com/apache_httpd/photo
> >  - interim logo https://britewire.com/apache-http-server/
> >  - new logo 
> > https://svn.apache.org/repos/asf/comdev/project-logos/originals/httpd.svg
> 
> So is the choice between
>  * use the exact same feather as the foundation's
>  * not use anything that even remotely looks like feather
> ?
> 
> > Whilst I understand the proposed design, I'm not *loving* the look of the 
> > logo, particularly as Apache Commons has such a massive footprint across so 
> > many projects.
> >
> > To that end, may I ask a favor?
> >
> > Would you and the Apache Commons PMC be amenable to considering having 
> > Central Services --a somewhat new sub-group of ASF Marketing & Publicity-- 
> > help you with creating a new logo?
> 
> Help from experts is welcome.
> 
> > If you are not in a rush, we can see how we can help you.
> 
> I don't think we should be in a rush, as the proposal to change the
> projects' logo(s) dates back from 3 years ago.[1]
> 
> > ApacheCon North America starts on Monday, and we can start the discussions 
> > on what your requirements are and the best way to meet your needs.
> 
> I can only speak about of my preferences:[2]
>  * At most 2 or 3 graphical elements reminiscent of the project
>  (feather included, if applicable)
>  * No URL
>  * Clearly visible at all (reasonable) resolutions [3]
>  * Combinable with 1 additional grahical element (so that we can
> easily create one logo for each of the many components hosted
> in "Commons" [4]
> 
> > ApacheCon Europe is taking place in October: I was thinking the timeframe 
> > between the two events (~6 weeks) would be sufficient for us to have a few 
> > proposals developed.
> 
> Great.
> 
> > If this works for you, we can get started this week.
> 
> Fine with me.
> 
> > If not, I understand. You may proceed with the proposed logo with the 
> > intention of revisiting and updating in future.
> 
> Now is a good time.
> Indeed, that logo is not favoured by the community (at least the few
> who voiced their opinion).[5]  And, IMHO, the alternatives are failing
> what I consider basic requirements (cf. above).[6]
> 
> > Many kind thanks again for your attention and consideration.
> >
> > Warm regards,
> > Sally
> 
> Thank you very much for the offer,
> Gilles
> 
> [1] https://issues.apache.org/jira/browse/COMMONSSITE-86
> [2] Discussion thread:
> https://markmail.org/message/twsre7wl6jmue6mp
> [3] For example, when I look at the top left of the Apache's JIRA pages:
> https://issues.apache.org/jira/secure/Dashboard.jspa
> I see either a bad logo, or an inadequate use of it.
> [4] See e.g. http://commons.apache.org/proper/commons-rng/
> [5] Lacking feedback, I opted for an upgrade of the feather using
> the foundation's new graphics keeping the old (and supposedly
> consensual) idea for the feather orientation.
> [6] Even though it's great that Loic Guibert was willing to provide
> idea and a few examples.
> 
> >
> > Tel +1 617 921 8656 | s...@apache.org
> >
> > On Fri, Sep 6, 2019, at 17:18, Gilles Sadowski wrote:
> > > Hello.
> > >
> > > We, at Apache Commons, would like to know whether an Apache
> > > project  is authorized to extract graphical elements from the
> &g

Re: Advice on project logo

2019-09-07 Thread Sally Khudairi
Thank you, Gilles. I appreciate you reaching out.

Normally I encourage PMCs to not re-orient or "spindle" the feather where 
possible, but I understand that some legacy logos have a bit of a problem with 
positioning. For example, the Apache HTTP Server logo:

 - original logo https://twitter.com/apache_httpd/photo
 - interim logo https://britewire.com/apache-http-server/
 - new logo 
https://svn.apache.org/repos/asf/comdev/project-logos/originals/httpd.svg


Whilst I understand the proposed design, I'm not *loving* the look of the logo, 
particularly as Apache Commons has such a massive footprint across so many 
projects.

To that end, may I ask a favor?

Would you and the Apache Commons PMC be amenable to considering having Central 
Services --a somewhat new sub-group of ASF Marketing & Publicity-- help you 
with creating a new logo? 

If you are not in a rush, we can see how we can help you. ApacheCon North 
America starts on Monday, and we can start the discussions on what your 
requirements are and the best way to meet your needs. ApacheCon Europe is 
taking place in October: I was thinking the timeframe between the two events 
(~6 weeks) would be sufficient for us to have a few proposals developed.

If this works for you, we can get started this week.

If not, I understand. You may proceed with the proposed logo with the intention 
of revisiting and updating in future.

Many kind thanks again for your attention and consideration.

Warm regards,
Sally

- - - 
Vice President Marketing & Publicity
Vice President Sponsor Relations
The Apache Software Foundation

Tel +1 617 921 8656 | s...@apache.org

On Fri, Sep 6, 2019, at 17:18, Gilles Sadowski wrote:
> Hello.
> 
> We, at Apache Commons, would like to know whether an Apache
> project  is authorized to extract graphical elements from the
> foundation's logo, apply some transformation to them, and use
> the result in order to compose its own logo.
> 
> Case in point is here:
> 
> https://svn.apache.org/repos/asf/comdev/project-logos/originals/commons.svg
> (where the feather has been rotated).
> 
> Does it constitute a breach of the recommendations published in
> the "Identity Style Guide"?[1]
> 
> Thank you,
> Gilles Sadowski
> 
> [1] https://apache.org/foundation/press/kit/ApacheFoundation_StyleGuide.pdf
>

-
To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
For additional commands, e-mail: dev-h...@commons.apache.org



Re: [SITE] Adopting the new ASF Logo

2016-01-28 Thread Sally Khudairi
Hey Gary! Thanks for your note.
Alas, I'm unable to do any graphics work at this time, but I'll ping our 
designers to see if they can provide the design specs. We're working on a style 
guide that will contain all this information, but that's a long ways out, so 
hopefully I'll have an answer for you soon :-)
Cheers,Sally 
 

  From: Gary Gregory 
 To: Commons Developers List ; Sally Khudairi 
 
 Sent: Thursday, January 28, 2016 11:38 AM
 Subject: Re: [SITE] Adopting the new ASF Logo
   
Sally,
Do I recall correctly that you offered assistance a while back to create or 
update logos?
If not, what is the font used in the assets?
Thank you,Gary

On Thu, Jan 28, 2016 at 4:01 AM, Benedikt Ritter  wrote:

Hi all,

we're still using the "old" Feather logo throughout our websites. Is
anybody capable of creating a logo based on the new Feather logo?

Regards,
Benedikt

--
http://home.apache.org/~britter/
http://twitter.com/BenediktRitter
http://github.com/britter




-- 
E-Mail: garydgreg...@gmail.com | ggreg...@apache.org 
Java Persistence with Hibernate, Second Edition
JUnit in Action, Second Edition
Spring Batch in Action
Blog: http://garygregory.wordpress.com 
Home: http://garygregory.com/
Tweet! http://twitter.com/GaryGregory

  

Re: Blog post "commons" vulnerability

2015-11-10 Thread Sally Khudairi
You're most welcome! Lots of heavy activity on Twitter as well :-) -Sally
  From: Gary Gregory 
 To: Commons Developers List ; Sally Khudairi 
 
 Sent: Tuesday, November 10, 2015 10:40 AM
 Subject: Re: Blog post "commons" vulnerability
   
Thank you Sally!GaryOn Nov 10, 2015 2:20 AM, "Sally Khudairi"  
wrote:

Hello everyone --we are live:
 - ASF "Foundation" blog http://s.apache.org/bsA - @TheASF Twitter feed 
https://twitter.com/TheASF/status/664023691051843584
...plus sent to annou...@apache.org and our dedicated media/analyst 
distribution list. This will appear on the apache.org homepage during the next 
auto-update, which should take place within the hour.
Thanks so much for your help with this. I'm glad we were able to get it out!
Warmly,Sally
+ copying press@ to keep the team in the loop. = = = = = vox +1 617 921 8656 
off2 +1 646 583 3362 skype sallykhudairi
      From: "Frohoff, Chris" 
 To: Sally Khudairi ; "e...@zusammenkunft.net" 
; Gabriel Lawrence ; 
Commons Developers List 
 Sent: Monday, November 9, 2015 6:42 PM
 Subject: RE: Blog post "commons" vulnerability

#yiv5799872531 #yiv5799872531 -- _filtered #yiv5799872531 
{font-family:Helvetica;panose-1:2 11 6 4 2 2 2 2 2 4;} _filtered #yiv5799872531 
{panose-1:2 4 5 3 5 4 6 3 2 4;} _filtered #yiv5799872531 
{font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;} _filtered #yiv5799872531 
{font-family:Consolas;panose-1:2 11 6 9 2 2 4 3 2 4;}#yiv5799872531 
#yiv5799872531 p.yiv5799872531MsoNormal, #yiv5799872531 
li.yiv5799872531MsoNormal, #yiv5799872531 div.yiv5799872531MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;}#yiv5799872531 a:link, 
#yiv5799872531 span.yiv5799872531MsoHyperlink 
{color:blue;text-decoration:underline;}#yiv5799872531 a:visited, #yiv5799872531 
span.yiv5799872531MsoHyperlinkFollowed 
{color:purple;text-decoration:underline;}#yiv5799872531 pre 
{margin:0in;margin-bottom:.0001pt;font-size:10.0pt;}#yiv5799872531 
span.yiv5799872531HTMLPreformattedChar {font-family:Consolas;}#yiv5799872531 
span.yiv5799872531EmailStyle19 {color:#1F497D;}#yiv5799872531 
.yiv5799872531MsoChpDefault {font-size:10.0pt;} _filtered #yiv5799872531 
{margin:1.0in 1.0in 1.0in 1.0in;}#yiv5799872531 div.yiv5799872531WordSection1 
{}#yiv5799872531 All,    I just wanted to make sure that this didn’t get missed 
in the comments:    “I’d suggest doing this for anything Serializable that 
performs reflection for completeness.”    I think there’s a reasonable chance 
another gadget chain could be constructed from one or more of the below 
classes. I’d suggest extending your patch similarly to these if it’s not too 
difficult.    $ grep -ER -e "lang.reflect.(Method|Constructor)" src/main 
--include=*.java -l | grep -v InvokerTransformer | xargs -n1 grep -l 
Serializable 
src/main/java/org/apache/commons/collections4/functors/InstantiateFactory.java 
src/main/java/org/apache/commons/collections4/functors/InstantiateTransformer.java
 src/main/java/org/apache/commons/collections4/functors/PrototypeFactory.java   
 Thanks,    -Chris   

From: Sally Khudairi [mailto:sallykhuda...@yahoo.com]
Sent: Monday, November 09, 2015 3:15 PM
To: Sally Khudairi; e...@zusammenkunft.net; Frohoff, Chris; Gabriel Lawrence; 
Commons Developers List
Subject: Re: Blog post "commons" vulnerability    Just to clarify re: PMC 
affiliation, may I suggest it appear as:    > Authors: Bernd Eckenfels and Gary 
Gregory, members of the Apache Commons Project Management Committee      I'm 
happy to proceed tonight if this meets your approval. If you can please give 
the go-ahead by 7PM ET (= ~45 minutes from now), that would be great.    
Otherwise, I'm happy to issue tomorrow morning.    Thanks,
Sally       = = = = = vox +1 617 921 8656 off2 +1 646 583 3362 skype 
sallykhudairi    From: Sally Khudairi 
To: e...@zusammenkunft.net; "Frohoff, Chris" ; Gabriel 
Lawrence ; Commons Developers List 

Sent: Monday, November 9, 2015 5:29 PM
Subject: Re: Blog post "commons" vulnerability    Thanks so much, Bernd.    
Personally, I prefer mentioning PMC affiliation, as it adds credibility, but 
I'll post it however you'd like.    OK re: tweet screenshot; I've included it.  
  Please let me know when you're ready, and I'll publish.    Warmly, Sally      
 [From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]    - Reply message -
From: e...@zusammenkunft.net
To: "Frohoff, Chris" , "Gabriel Lawrence" 
, "Commons Developers List" 
, "Sally Khudairi" 
Subject: Blog post "commons" vulnerability
Date: Mon, Nov 9, 2015 17:24

 Hello Sally,    Yes it is just a screenshot of a tweet, I could not come up 
with a useful graohic for the topic and since discussion on Twitter somewhat 
powered all the fuzz I figured it would fit.    Regarding Phils comment I think 

Re: Blog post "commons" vulnerability

2015-11-10 Thread Sally Khudairi
Hello everyone --we are live:
 - ASF "Foundation" blog http://s.apache.org/bsA - @TheASF Twitter feed 
https://twitter.com/TheASF/status/664023691051843584
...plus sent to annou...@apache.org and our dedicated media/analyst 
distribution list. This will appear on the apache.org homepage during the next 
auto-update, which should take place within the hour.
Thanks so much for your help with this. I'm glad we were able to get it out!
Warmly,Sally
+ copying press@ to keep the team in the loop. = = = = = vox +1 617 921 8656 
off2 +1 646 583 3362 skype sallykhudairi
  From: "Frohoff, Chris" 
 To: Sally Khudairi ; "e...@zusammenkunft.net" 
; Gabriel Lawrence ; 
Commons Developers List  
 Sent: Monday, November 9, 2015 6:42 PM
 Subject: RE: Blog post "commons" vulnerability
   
#yiv5799872531 #yiv5799872531 -- _filtered #yiv5799872531 
{font-family:Helvetica;panose-1:2 11 6 4 2 2 2 2 2 4;} _filtered #yiv5799872531 
{panose-1:2 4 5 3 5 4 6 3 2 4;} _filtered #yiv5799872531 
{font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;} _filtered #yiv5799872531 
{font-family:Consolas;panose-1:2 11 6 9 2 2 4 3 2 4;}#yiv5799872531 
#yiv5799872531 p.yiv5799872531MsoNormal, #yiv5799872531 
li.yiv5799872531MsoNormal, #yiv5799872531 div.yiv5799872531MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;}#yiv5799872531 a:link, 
#yiv5799872531 span.yiv5799872531MsoHyperlink 
{color:blue;text-decoration:underline;}#yiv5799872531 a:visited, #yiv5799872531 
span.yiv5799872531MsoHyperlinkFollowed 
{color:purple;text-decoration:underline;}#yiv5799872531 pre 
{margin:0in;margin-bottom:.0001pt;font-size:10.0pt;}#yiv5799872531 
span.yiv5799872531HTMLPreformattedChar {font-family:Consolas;}#yiv5799872531 
span.yiv5799872531EmailStyle19 {color:#1F497D;}#yiv5799872531 
.yiv5799872531MsoChpDefault {font-size:10.0pt;} _filtered #yiv5799872531 
{margin:1.0in 1.0in 1.0in 1.0in;}#yiv5799872531 div.yiv5799872531WordSection1 
{}#yiv5799872531 All,    I just wanted to make sure that this didn’t get missed 
in the comments:    “I’d suggest doing this for anything Serializable that 
performs reflection for completeness.”    I think there’s a reasonable chance 
another gadget chain could be constructed from one or more of the below 
classes. I’d suggest extending your patch similarly to these if it’s not too 
difficult.    $ grep -ER -e "lang.reflect.(Method|Constructor)" src/main 
--include=*.java -l | grep -v InvokerTransformer | xargs -n1 grep -l 
Serializable 
src/main/java/org/apache/commons/collections4/functors/InstantiateFactory.java 
src/main/java/org/apache/commons/collections4/functors/InstantiateTransformer.java
 src/main/java/org/apache/commons/collections4/functors/PrototypeFactory.java   
 Thanks,    -Chris    

From: Sally Khudairi [mailto:sallykhuda...@yahoo.com]
Sent: Monday, November 09, 2015 3:15 PM
To: Sally Khudairi; e...@zusammenkunft.net; Frohoff, Chris; Gabriel Lawrence; 
Commons Developers List
Subject: Re: Blog post "commons" vulnerability    Just to clarify re: PMC 
affiliation, may I suggest it appear as:    > Authors: Bernd Eckenfels and Gary 
Gregory, members of the Apache Commons Project Management Committee      I'm 
happy to proceed tonight if this meets your approval. If you can please give 
the go-ahead by 7PM ET (= ~45 minutes from now), that would be great.    
Otherwise, I'm happy to issue tomorrow morning.    Thanks,
Sally       = = = = = vox +1 617 921 8656 off2 +1 646 583 3362 skype 
sallykhudairi    From: Sally Khudairi 
To: e...@zusammenkunft.net; "Frohoff, Chris" ; Gabriel 
Lawrence ; Commons Developers List 

Sent: Monday, November 9, 2015 5:29 PM
Subject: Re: Blog post "commons" vulnerability    Thanks so much, Bernd.    
Personally, I prefer mentioning PMC affiliation, as it adds credibility, but 
I'll post it however you'd like.    OK re: tweet screenshot; I've included it.  
  Please let me know when you're ready, and I'll publish.    Warmly, Sally      
 [From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]    - Reply message -
From: e...@zusammenkunft.net
To: "Frohoff, Chris" , "Gabriel Lawrence" 
, "Commons Developers List" 
, "Sally Khudairi" 
Subject: Blog post "commons" vulnerability
Date: Mon, Nov 9, 2015 17:24 

 Hello Sally,    Yes it is just a screenshot of a tweet, I could not come up 
with a useful graohic for the topic and since discussion on Twitter somewhat 
powered all the fuzz I figured it would fit.    Regarding Phils comment I think 
having some "apache commons" communication on blogs does help the bonding with 
the project, however since the topic is urgend I suggest two minor edits    
Authors: Bernd Eckenfels and Gary Gregory (Apache Commons Committers) Title: 
Widespread Java Object de-serialisation vulnerabilities    (I.e. less formal. 
Gary I guess 

Re: Blog post "commons" vulnerability

2015-11-09 Thread Sally Khudairi
Thanks, Chris.

I read that as an internal comment to the PMC/folks on the list.

I have incorporated all other comments/corrections/additions.

Please let me know if I have misinterpreted this.

Kind regards,
Sally


[From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]

- Reply message -
From: "Frohoff, Chris" 
To: "Sally Khudairi" , "e...@zusammenkunft.net" 
, "Gabriel Lawrence" , 
"Commons Developers List" 
Subject: Blog post "commons" vulnerability
Date: Mon, Nov 9, 2015 18:42

All,

I just wanted to make sure that this didn’t get missed in the comments:

“I’d suggest doing this for anything Serializable that performs reflection for 
completeness.”

I think there’s a reasonable chance another gadget chain could be constructed 
from one or more of the below classes. I’d suggest extending your patch 
similarly
to these if it’s not too difficult.

$ grep -ER -e "lang.reflect.(Method|Constructor)" src/main --include=*.java -l 
| grep -v InvokerTransformer | xargs -n1 grep -l Serializable
src/main/java/org/apache/commons/collections4/functors/InstantiateFactory.java
src/main/java/org/apache/commons/collections4/functors/InstantiateTransformer.java
src/main/java/org/apache/commons/collections4/functors/PrototypeFactory.java

Thanks,

-Chris



From: Sally Khudairi [mailto:sallykhuda...@yahoo.com]


Sent: Monday, November 09, 2015 3:15 PM

To: Sally Khudairi; e...@zusammenkunft.net; Frohoff, Chris; Gabriel Lawrence; 
Commons Developers List

Subject: Re: Blog post "commons" vulnerability







Just to clarify re: PMC affiliation, may I suggest it appear as:







> Authors: Bernd Eckenfels and Gary Gregory, members of the Apache Commons 
> Project Management Committee











I'm happy to proceed tonight if this meets your approval. If you can please 
give the go-ahead by 7PM ET (= ~45 minutes from now), that
would be great.







Otherwise, I'm happy to issue tomorrow morning.







Thanks,

Sally











= = = = = vox +1 617 921 8656 off2 +1 646 583 3362 skype sallykhudairi











From: Sally Khudairi 

To: e...@zusammenkunft.net; "Frohoff, Chris" ; Gabriel 
Lawrence ;
Commons Developers List 


Sent: Monday, November 9, 2015 5:29 PM

Subject: Re: Blog post "commons" vulnerability







Thanks so much, Bernd.







Personally, I prefer mentioning PMC affiliation, as it adds credibility, but 
I'll post it however you'd like.







OK re: tweet screenshot; I've included it.







Please let me know when you're ready, and I'll publish.







Warmly,



Sally











[From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]




- Reply message -

From: e...@zusammenkunft.net

To: "Frohoff, Chris" , "Gabriel Lawrence" 
, "Commons Developers List" 
,
"Sally Khudairi" 

Subject: Blog post "commons" vulnerability

Date: Mon, Nov 9, 2015 17:24









Hello Sally,

Yes it is just a screenshot of a tweet, I could not come up with a useful 
graohic for the topic and since discussion on Twitter somewhat powered all the 
fuzz I figured it would fit.

Regarding Phils comment I think having some "apache commons" communication on 
blogs does help the bonding with the project, however since the topic is urgend 
I suggest two minor edits

Authors: Bernd Eckenfels and Gary Gregory (Apache Commons Committers)
Title: Widespread Java Object de-serialisation vulnerabilities

(I.e. less formal. Gary I guess you would agree not to mention PMC?)

Gruss
Bernd


-- 
http://bernd.eckenfels.net

-Original Message-
From: Sally Khudairi 
To: "Frohoff, Chris" , Gabriel Lawrence 
, Commons Developers List 
Sent: Mo., 09 Nov. 2015 22:36
Subject: Re: Blog post "commons" vulnerability

Thanks, Chris. I'll include your edits.
Status-wise, I'm uploading the copy to blogs.apache.org. I noticed that the 
"screenshot" referenced at https://twitter.com/gebl/status/662786601425080320 
is simply the tweet status. Is that intentional? Do  you want me to include a 
screenshot of this?
Please forward any additional comments/corrections/additions within the next 
hour if possible. I'd like to get this out before close of business Pacific 
Time if at all possible.
Thanking you in advance,Sally = = = = = vox +1 617 921 8656 off2 +1 646 583 
3362 skype sallykhudairi
From: "Frohoff, Chris" 
To: Gabriel Lawrence ; Commons Developers List 
 
Cc: Sally Khudairi  
Sent: Monday, November 9, 2015 12:31 PM
Subject: RE: Blog post "commons" vulnerability

#yiv5525942083 #yiv5525942083 -- _filtered #yiv5525942083 {panose-1:2 4 5 3 5 4 
6 3 2 4;} _filtered #yiv5525942083 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 
3 2 4;}#yiv5525942083 #yiv5525942083 p.yiv5525942083MsoNormal, #yiv5525942083 
li.yiv

Re: Blog post "commons" vulnerability

2015-11-09 Thread Sally Khudairi
Just to clarify re: PMC affiliation, may I suggest it appear as:
> Authors: Bernd Eckenfels and Gary Gregory, members of the Apache Commons 
> Project Management Committee
 
I'm happy to proceed tonight if this meets your approval. If you can please 
give the go-ahead by 7PM ET (= ~45 minutes from now), that would be great.
Otherwise, I'm happy to issue tomorrow morning.
Thanks,
Sally

= = = = = vox +1 617 921 8656 off2 +1 646 583 3362 skype sallykhudairi
  From: Sally Khudairi 
 To: e...@zusammenkunft.net; "Frohoff, Chris" ; Gabriel 
Lawrence ; Commons Developers List 
 
 Sent: Monday, November 9, 2015 5:29 PM
 Subject: Re: Blog post "commons" vulnerability
   
Thanks so much, Bernd.
Personally, I prefer mentioning PMC affiliation, as it adds credibility, but 
I'll post it however you'd like.
OK re: tweet screenshot; I've included it.
Please let me know when you're ready, and I'll publish.
Warmly,Sally

[From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]
- Reply message -
From: e...@zusammenkunft.net
To: "Frohoff, Chris" , "Gabriel Lawrence" 
, "Commons Developers List" 
, "Sally Khudairi" 
Subject: Blog post "commons" vulnerability
Date: Mon, Nov 9, 2015 17:24
Hello Sally,

Yes it is just a screenshot of a tweet, I could not come up with a useful 
graohic for the topic and since discussion on Twitter somewhat powered all the 
fuzz I figured it would fit.

Regarding Phils comment I think having some "apache commons" communication on 
blogs does help the bonding with the project, however since the topic is urgend 
I suggest two minor edits

Authors: Bernd Eckenfels and Gary Gregory (Apache Commons Committers)
Title: Widespread Java Object de-serialisation vulnerabilities

(I.e. less formal. Gary I guess you would agree not to mention PMC?)

Gruss
Bernd


-- 
http://bernd.eckenfels.net

-Original Message-
From: Sally Khudairi 
To: "Frohoff, Chris" , Gabriel Lawrence 
, Commons Developers List 
Sent: Mo., 09 Nov. 2015 22:36
Subject: Re: Blog post "commons" vulnerability

Thanks, Chris. I'll include your edits.
Status-wise, I'm uploading the copy to blogs.apache.org. I noticed that the 
"screenshot" referenced at https://twitter.com/gebl/status/662786601425080320 
is simply the tweet status. Is that intentional? Do  you want me to include a 
screenshot of this?
Please forward any additional comments/corrections/additions within the next 
hour if possible. I'd like to get this out before close of business Pacific 
Time if at all possible.
Thanking you in advance,Sally = = = = = vox +1 617 921 8656 off2 +1 646 583 
3362 skype sallykhudairi
  From: "Frohoff, Chris" 
 To: Gabriel Lawrence ; Commons Developers List 
 
Cc: Sally Khudairi  
 Sent: Monday, November 9, 2015 12:31 PM
 Subject: RE: Blog post "commons" vulnerability
   
#yiv5525942083 #yiv5525942083 -- _filtered #yiv5525942083 {panose-1:2 4 5 3 5 4 
6 3 2 4;} _filtered #yiv5525942083 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 
3 2 4;}#yiv5525942083 #yiv5525942083 p.yiv5525942083MsoNormal, #yiv5525942083 
li.yiv5525942083MsoNormal, #yiv5525942083 div.yiv5525942083MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;}#yiv5525942083 a:link, 
#yiv5525942083 span.yiv5525942083MsoHyperlink 
{color:blue;text-decoration:underline;}#yiv5525942083 a:visited, #yiv5525942083 
span.yiv5525942083MsoHyperlinkFollowed 
{color:purple;text-decoration:underline;}#yiv5525942083 
span.yiv5525942083hoenzb {}#yiv5525942083 span.yiv5525942083EmailStyle18 
{color:#1F497D;}#yiv5525942083 span.yiv5525942083EmailStyle19 
{color:windowtext;}#yiv5525942083 .yiv5525942083MsoChpDefault {} _filtered 
#yiv5525942083 {margin:1.0in 1.0in 1.0in 1.0in;}#yiv5525942083 
div.yiv5525942083WordSection1 {}#yiv5525942083 Minor grammatical changes and 
comments inline. The main thing I’d suggest is expanding your patch to include 
any Serializable classes that perform reflection for completeness.---
Apache Commons statement to widespread Java object de-serialisation
vulnerability

Authors: Bernd Eckenfels, Gary Grogory for Apache Commons

In their
[talk](http://frohoff.github.io/appseccali-marshalling-pickles/)
"Marshalling Pickles - how deserializing objects will ruin your day" at
AppSecCali2015 Gabriel Lawrence ([@gebl](https://twitter.com/gebl)) and
Chris Frohoff ([@frohoff](https://twitter.com/frohoff)) presented
various security problems when applications accept serialized objects
from untrusted source. A major finding describes a way to execute
arbitrary Java functions and even inject manipulated bytecode when
using Java Object Serialization (as used in some remote communication
and persistence protocols).

Building on Frohoff's tool ( add “ing”)
[ysoserial](https://github.com/frohoff/ysoserial), Stephen Breen
([@breenmac

Re: Blog post "commons" vulnerability

2015-11-09 Thread Sally Khudairi
Thanks so much, Bernd.

Personally, I prefer mentioning PMC affiliation, as it adds credibility, but 
I'll post it however you'd like.

OK re: tweet screenshot; I've included it.

Please let me know when you're ready, and I'll publish.

Warmly,
Sally


[From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]

- Reply message -
From: e...@zusammenkunft.net
To: "Frohoff, Chris" , "Gabriel Lawrence" 
, "Commons Developers List" 
, "Sally Khudairi" 
Subject: Blog post "commons" vulnerability
Date: Mon, Nov 9, 2015 17:24

Hello Sally,

Yes it is just a screenshot of a tweet, I could not come up with a useful 
graohic for the topic and since discussion on Twitter somewhat powered all the 
fuzz I figured it would fit.

Regarding Phils comment I think having some "apache commons" communication on 
blogs does help the bonding with the project, however since the topic is urgend 
I suggest two minor edits

Authors: Bernd Eckenfels and Gary Gregory (Apache Commons Committers)
Title: Widespread Java Object de-serialisation vulnerabilities

(I.e. less formal. Gary I guess you would agree not to mention PMC?)

Gruss
Bernd


-- 
http://bernd.eckenfels.net

-Original Message-
From: Sally Khudairi 
To: "Frohoff, Chris" , Gabriel Lawrence 
, Commons Developers List 
Sent: Mo., 09 Nov. 2015 22:36
Subject: Re: Blog post "commons" vulnerability

Thanks, Chris. I'll include your edits.
Status-wise, I'm uploading the copy to blogs.apache.org. I noticed that the 
"screenshot" referenced at https://twitter.com/gebl/status/662786601425080320 
is simply the tweet status. Is that intentional? Do  you want me to include a 
screenshot of this?
Please forward any additional comments/corrections/additions within the next 
hour if possible. I'd like to get this out before close of business Pacific 
Time if at all possible.
Thanking you in advance,Sally = = = = = vox +1 617 921 8656 off2 +1 646 583 
3362 skype sallykhudairi
From: "Frohoff, Chris" 
To: Gabriel Lawrence ; Commons Developers List 
 
Cc: Sally Khudairi  
Sent: Monday, November 9, 2015 12:31 PM
Subject: RE: Blog post "commons" vulnerability

#yiv5525942083 #yiv5525942083 -- _filtered #yiv5525942083 {panose-1:2 4 5 3 5 4 
6 3 2 4;} _filtered #yiv5525942083 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 
3 2 4;}#yiv5525942083 #yiv5525942083 p.yiv5525942083MsoNormal, #yiv5525942083 
li.yiv5525942083MsoNormal, #yiv5525942083 div.yiv5525942083MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;}#yiv5525942083 a:link, 
#yiv5525942083 span.yiv5525942083MsoHyperlink 
{color:blue;text-decoration:underline;}#yiv5525942083 a:visited, #yiv5525942083 
span.yiv5525942083MsoHyperlinkFollowed 
{color:purple;text-decoration:underline;}#yiv5525942083 
span.yiv5525942083hoenzb {}#yiv5525942083 span.yiv5525942083EmailStyle18 
{color:#1F497D;}#yiv5525942083 span.yiv5525942083EmailStyle19 
{color:windowtext;}#yiv5525942083 .yiv5525942083MsoChpDefault {} _filtered 
#yiv5525942083 {margin:1.0in 1.0in 1.0in 1.0in;}#yiv5525942083 
div.yiv5525942083WordSection1 {}#yiv5525942083 Minor grammatical changes and 
comments inline. The main thing I’d suggest is expanding your patch to include 
any Serializable classes that perform reflection for completeness.---
Apache Commons statement to widespread Java object de-serialisation
vulnerability

Authors: Bernd Eckenfels, Gary Grogory for Apache Commons

In their
[talk](http://frohoff.github.io/appseccali-marshalling-pickles/)
"Marshalling Pickles - how deserializing objects will ruin your day" at
AppSecCali2015 Gabriel Lawrence ([@gebl](https://twitter.com/gebl)) and
Chris Frohoff ([@frohoff](https://twitter.com/frohoff)) presented
various security problems when applications accept serialized objects
from untrusted source. A major finding describes a way to execute
arbitrary Java functions and even inject manipulated bytecode when
using Java Object Serialization (as used in some remote communication
and persistence protocols).

Building on Frohoff's tool ( add “ing”)
[ysoserial](https://github.com/frohoff/ysoserial), Stephen Breen
([@breenmachine](https://twitter.com/breenmachine)) of Foxglove
Security inspected various products like WebSphere, JBoss, Jenkins,
WebLogic, and OpenNMS and describes
(http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/)
for each of them various attack scenarios.

Both research works show[s] that developers put too much trust in Java  ( 
remove plural)
Object Serialization. Some even de-serialize objects
pre-authentication. When deserializing an Object in Java you typically
cast it to an expected type, and therefore Java's strict type system
will ensure you only get valid object trees. Unfortunately, by the 

Re: Blog post "commons" vulnerability

2015-11-09 Thread Sally Khudairi
Thanks, Chris. I'll include your edits.
Status-wise, I'm uploading the copy to blogs.apache.org. I noticed that the 
"screenshot" referenced at https://twitter.com/gebl/status/662786601425080320 
is simply the tweet status. Is that intentional? Do  you want me to include a 
screenshot of this?
Please forward any additional comments/corrections/additions within the next 
hour if possible. I'd like to get this out before close of business Pacific 
Time if at all possible.
Thanking you in advance,Sally = = = = = vox +1 617 921 8656 off2 +1 646 583 
3362 skype sallykhudairi
  From: "Frohoff, Chris" 
 To: Gabriel Lawrence ; Commons Developers List 
 
Cc: Sally Khudairi  
 Sent: Monday, November 9, 2015 12:31 PM
 Subject: RE: Blog post "commons" vulnerability
   
#yiv5525942083 #yiv5525942083 -- _filtered #yiv5525942083 {panose-1:2 4 5 3 5 4 
6 3 2 4;} _filtered #yiv5525942083 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 
3 2 4;}#yiv5525942083 #yiv5525942083 p.yiv5525942083MsoNormal, #yiv5525942083 
li.yiv5525942083MsoNormal, #yiv5525942083 div.yiv5525942083MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;}#yiv5525942083 a:link, 
#yiv5525942083 span.yiv5525942083MsoHyperlink 
{color:blue;text-decoration:underline;}#yiv5525942083 a:visited, #yiv5525942083 
span.yiv5525942083MsoHyperlinkFollowed 
{color:purple;text-decoration:underline;}#yiv5525942083 
span.yiv5525942083hoenzb {}#yiv5525942083 span.yiv5525942083EmailStyle18 
{color:#1F497D;}#yiv5525942083 span.yiv5525942083EmailStyle19 
{color:windowtext;}#yiv5525942083 .yiv5525942083MsoChpDefault {} _filtered 
#yiv5525942083 {margin:1.0in 1.0in 1.0in 1.0in;}#yiv5525942083 
div.yiv5525942083WordSection1 {}#yiv5525942083 Minor grammatical changes and 
comments inline. The main thing I’d suggest is expanding your patch to include 
any Serializable classes that perform reflection for completeness.    ---
Apache Commons statement to widespread Java object de-serialisation
vulnerability

Authors: Bernd Eckenfels, Gary Grogory for Apache Commons

In their
[talk](http://frohoff.github.io/appseccali-marshalling-pickles/)
"Marshalling Pickles - how deserializing objects will ruin your day" at
AppSecCali2015 Gabriel Lawrence ([@gebl](https://twitter.com/gebl)) and
Chris Frohoff ([@frohoff](https://twitter.com/frohoff)) presented
various security problems when applications accept serialized objects
from untrusted source. A major finding describes a way to execute
arbitrary Java functions and even inject manipulated bytecode when
using Java Object Serialization (as used in some remote communication
and persistence protocols).

Building on Frohoff's tool ( add “ing”)
[ysoserial](https://github.com/frohoff/ysoserial), Stephen Breen
([@breenmachine](https://twitter.com/breenmachine)) of Foxglove
Security inspected various products like WebSphere, JBoss, Jenkins,
WebLogic, and OpenNMS and describes
(http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/)
for each of them various attack scenarios.

Both research works show[s] that developers put too much trust in Java  ( 
remove plural)
Object Serialization. Some even de-serialize objects
pre-authentication. When deserializing an Object in Java you typically
cast it to an expected type, and therefore Java's strict type system
will ensure you only get valid object trees. Unfortunately, by the time
the type checking happens, platform code has already created and
executed significant logic. So, before the final type is checked, a lot
of code is executed from the readObject() methods of various objects,
all of which is out of the developer's control. By combining the
readObject() methods of various classes which are available on the
classpath of the vulnerable application an attacker can execute
functions (including calling Runtime.exec() to execute local OS
commands).

The best protection against this, is to avoid using a complex
serialization protocol with untrusted peers. It is possible to limit
the impact when using a custom ObjectInputStream which overrides (*** replace 
“overwrites” with “overrides”)
[resolveClass()](http://docs.oracle.com/javase/7/docs/api/java/io/ObjectInputStream.html#resolveClass%28java.io.ObjectStreamClass%29)
to implement a whitelist approach ( link to 
http://www.ibm.com/developerworks/library/se-lookahead/?). This might, however, 
not always be
possible, such as when a framework or application server provides the endpoint. 
( add “such as”)
This is rather bad news, as there is no easy fix and applications need
to revisit their client-server protocols and overall architecture.

In these rather unfortunate situations, people have looked at the
sample exploits. Frohoff provided "gadget chains" in sample payloads
which combine classes from the Groovy runtime, Spring framework or Apache ( 
add “the”, rep

Re: Blog post "commons" vulnerability

2015-11-09 Thread Sally Khudairi
Thanks, Bernd. Thanks, Gary.

I'm happy to publish for you when I'm back at the office later today.

To confirm, is there consensus on the content?

Thanks again,
Sally

[From the mobile; please excuse top-posting, spelling/spacing errors, and 
brevity]

- Reply message -
From: "Gary Gregory" 
To: "Commons Developers List" 
Cc: , "Benedikt Ritter" , "Sally 
Khudairi" 
Subject: Blog post "commons" vulnerability
Date: Mon, Nov 9, 2015 07:50

My name is spelled Gary Gregory BTW ;-)
Gary
On Nov 9, 2015 2:45 AM, "Bernd Eckenfels"  wrote:Hello 
Sally,



currently there is a security vulnerability doing the rounds which uses

as an example Apache Commons Collection. It is not really a bug in

Commons Collection, but there is a lot of fuzz. So since we are doing

somethign in the Apache Commons team against the problem we wanted to

make a public statement.



Here is a blog post, which was discussed on the developer mailinglist.

What is needed to get it published via ASF blogs? (i.e. do you need a

PMC vote or similiar?)



The syntax for links is markdown, you might have to replace them (so

the links are hidden). Let me know if you have some suggestions for

improvement.



Greetings

Bernd (e...@apache.org)





---

Apache Commons statement to widespread Java object de-serialisation

vulnerability



Authors: Bernd Eckenfels, Gary Grogory for Apache Commons



In their

[talk](http://frohoff.github.io/appseccali-marshalling-pickles/)

"Marshalling Pickles - how deserializing objects will ruin your day" at

AppSecCali2015 Gabriel Lawrence ([@gebl](https://twitter.com/gebl)) and

Chris Frohoff ([@frohoff](https://twitter.com/frohoff)) presented

various security problems when applications accept serialized objects

from untrusted source. A major finding describes a way to execute

arbitrary Java functions and even inject manipulated bytecode when

using Java Object Serialization (as used in some remote communication

and persistence protocols).



Build on Frohoff's tool

[ysoserial](https://github.com/frohoff/ysoserial), Stephen Breen

([@breenmachine](https://twitter.com/breenmachine)) of Foxglove

Security inspected various products like WebSphere, JBoss, Jenkins,

WebLogic, and OpenNMS and describes

(http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/)

for each of them various attack scenarios.



Both research works shows that developers put too much trust in Java

Object Serialization. Some even de-serialize objects

pre-authentication. When deserializing an Object in Java you typically

cast it to an expected type, and therefore Java's strict type system

will ensure you only get valid object trees. Unfortunately, by the time

the type checking happens, platform code has already created and

executed significant logic. So, before the final type is checked a lot

of code is executed from the readObject() methods of various objects,

all of which is out of the developer's control. By combining the

readObject() methods of various classes which are available on the

classpath of the vulnerable application an attacker can execute

functions (including calling Runtime.exec() to execute local OS

commands).



The best protection against this, is to avoid using a complex

serialization protocol with untrusted peers. It is possible to limit

the impact when using a custom ObjectInputStream which overwrites

[resolveClass()](http://docs.oracle.com/javase/7/docs/api/java/io/ObjectInputStream.html#resolveClass%28java.io.ObjectStreamClass%29)

to implement a whitelist approach. This might however not always be

possible, when a framework or application server provides the endpoint.

This is rather bad news, as there is no easy fix and applications need

to revisit their client-server protocols and overall architecture.



In these rather unfortunate situations, people have looked at the

sample exploits. Frohoff provided "gadget chains" in sample payloads

which combine classes from Groovy runtime, Sprint framework or Apache

Commons Collection. It is quite certain that you can combine more

classes to exploit this weakness, but those are the chains readily

available to attackers today.



https://twitter.com/gebl/status/662786601425080320>



Even when the classes implementing a certain functionality cannot be

blamed for this vulnerability, and fixing the known cases will also not

make the usage of serialization in an untrusted context safe, there is

still demand to fix at least the known cases, even when this will only

start a Whack-a-Mole game. In fact, it is for this reason the original

team did not think it is necessary to alert the Apache Commons team,

hence work has begun relatively late. The Apache Commons team is using

the ticket

[COLLECTION-580](https://issues.apache.org/jira/browse/CO

Re: Call for Participation: Technical Talks -- ApacheCon North America 2010

2010-05-01 Thread Sally Khudairi
Thanks, Siefried. Thanks, Phil.

I believe we're fully booked for additional tracks. I'll double-check with the 
Planning team and will get back to you.

Cheers,
Sally


--- On Sat, 5/1/10, Phil Steitz  wrote:

> From: Phil Steitz 
> Subject: Re: Call for Participation: Technical Talks -- ApacheCon North 
> America 2010
> To: "Commons Developers List" 
> Cc: s...@apache.org
> Date: Saturday, May 1, 2010, 7:35 PM
> Siegfried Goeschl wrote:
> > Hi folks,
> > 
> > quite frankly I would love to give a presentation at
> ApacheCon but it
> > should be something that
> > 
> > +) is of general interest
> > +) and I have good knowledge about
> > +) and I also should actively contribute to the topic
> > 
> > which rules out pretty much everything ... :-)
> > 
> > Having said that I would like to pick up Rahoul's idea
> of doing a joint
> > presentation of Apache Commons (Rahoul organized a
> small scale one for
> > ApacheCon Europe 2007)
> > 
> > "Would it be a good idea to organize a Apache Commons
> track covering 2-3
> > regular speaking slots where we can present various
> Apache Commons
> > components?"
> > 
> > The point is that a Commons component presentation is
> probably be
> > smaller than a regular speaking slot but we have
> interesting stuff.
> > 
> > Feedback appreciated,
> > 
> > Siegfried Goeschl
> 
> We may be a little late to the party on this, but if there
> is still
> time / room to set up another track, I am +1.
> 
> I thought about suggesting a pool/dbcp talk for the tomcat
> track,
> but it would probably be better to do this as part of a
> commons
> track, if we can get that organized in time.
> 
> I could also do something on math if we have critical mass
> to do
> some other talks and can still get this in.
> 
> Sally - is is possible to still add a track?
> 
> All - any other volunteers / ideas?
> 
> Phil
> > 
> > 
> > On 28.04.10 19:48, Sally Khudairi wrote:
> >> ApacheCon North America 2010
> >> 1-5 November 2010 -- Westin Peachtree in Atlanta
> >>
> >> Technical Tracks: Call For Participation
> >> All submissions must be received by Friday, 28 May
> 2010 at midnight
> >> Pacific Time.
> >> The official conference, trainings, and expo of
> The Apache Software
> >> Foundation (ASF) returns to Atlanta this November,
> with dozens of
> >> technical, business, and community-focused
> sessions at the beginner,
> >> intermediate, and advanced levels.
> >>
> >> Over the past decade, the ASF has gone from
> strength to strength,
> >> developing and shepherding nearly 150 Top-Level
> Projects and new
> >> initiatives in the Apache Incubator and Labs. This
> year's ApacheCon
> >> celebrates how Apache technologies have sparked
> creativity, challenged
> >> processes, streamlined development, improved
> collaboration, launched
> >> businesses, bolstered economies, and improved
> lives.
> >>
> >> We are proud of our achievements and recognize
> that the global Apache
> >> community --both developers and users-- are
> responsible for the
> >> success and popularity of our products.
> >>
> >> The ApacheCon Planning Team are soliciting
> 50-minute technical
> >> presentations for the next conference, which will
> focus on the theme
> >> “Servers, the Cloud, and Innovation”.
> >>
> >> We are particularly interested in
> highly-relevant,
> >> professionally-directed presentations that
> demonstrate specific
> >> probrlems and real-world solutions. Part of the
> technical program has
> >> already been planned; we welcome proposals based
> on the following
> >> Apache Projects and related technical areas:
> >>
> >> - Cassandra/NoSQL
> >> - Content Technologies
> >> - (Java) Enterprise Development
> >> - Felix/OSGi
> >> - Geronimo
> >> - Hadoop + friends/Cloud Computing
> >> - Lucene, Mahout + friends/Search
> >> - Tomcat
> >> - Tuscany
> >> Submissions are open to anyone with relevant
> expertise: ASF
> >> affiliation is not required to present at, attend,
> or otherwise
> >> participate in ApacheCon.
> >>
> >> Please keep in mind that whilst we encourage
> submissions that the
> >> highlight the use of specific Apache solutions, we
> are unable to
> >> accept marketing/commercially-oriented
> presentatio