[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Nathaniel Brown
To think that they would be ignored if they are as important as everyone is making them out to be seems a shame. It's called organization. Putting a central resource where you can subscribe to - and yes, I did say you can actually subscribe to the list - won't stop people from reading them. Anyw

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Kevin Clark
I'd rather they be seen. On 3/29/07, Jarkko Laine <[EMAIL PROTECTED]> wrote: > On 29.3.2007, at 19.34, Julian Tarkhanov wrote: > > On Mar 29, 2007, at 5:25 PM, Tom Ward wrote: > >> +1. I'd like the notices to remain in rails-core > >> > >> Tom > > > > In fact I've reconcidered and I also give a

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Jarkko Laine
On 29.3.2007, at 19.34, Julian Tarkhanov wrote: On Mar 29, 2007, at 5:25 PM, Tom Ward wrote: +1. I'd like the notices to remain in rails-core Tom In fact I've reconcidered and I also give a +1 now CI is awareness and IMO the fact that errors clog the main list prompts to fix them faster +1

[Rails-core] Re: Some additional attacks on Cookie Session

2007-03-29 Thread Brad Ediger
On Mar 29, 2007, at 9:56 PM, S. Robert James wrote: On Mar 29, 9:49 pm, Brad Ediger <[EMAIL PROTECTED]> wrote: Agreed that "some secret phrase" will not yield 256 or even 128 bits of entropy. But the Rails app generator uses a version of generate_unique_id, which uses just about all of the syst

[Rails-core] Re: Some additional attacks on Cookie Session

2007-03-29 Thread S. Robert James
On Mar 29, 9:49 pm, Brad Ediger <[EMAIL PROTECTED]> wrote: > > 2. Entropy > > Related to #1: to resist brute force attacks, you really want 128 > > bits, and preferably 256 bits, of entropy. The source code suggests > > "some secret phrase", which is unlikely to come even close. The way > > to

[Rails-core] Re: Some additional attacks on Cookie Session

2007-03-29 Thread Brad Ediger
Great work, and an excellent analysis. Comments interspersed. On Mar 29, 2007, at 8:23 PM, S. Robert James wrote: Anyway, here's what we came up with: 1. Brute Force SHA512 can be computed _very_ fast. On my Pentium Core Duo: irb> z = 'z' * 100; puts Benchmark.measure { 1000.times { Digest::S

[Rails-core] Some additional attacks on Cookie Session

2007-03-29 Thread S. Robert James
Aside from the replay attacks discussed, there are some other attack vectors on the cookie_session store. I appreciate (and admire!) Jeremy's good humor on all of this: > Planting the seed here led to quick ripening and plenty of pesticide. > Thanks for the fish, all. > > jeremy Anyway, here's w

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Brad Ediger
On Mar 29, 2007, at 2:43 PM, Thijs van der Vossen wrote: On Mar 29, 2007, at 21:35, Jeremy Kemper wrote: On 3/29/07, Obie Fernandez <[EMAIL PROTECTED]> wrote: On 3/29/07, Tomas Jogin <[EMAIL PROTECTED]> wrote: How about just NOT changing the default setting to this less secure option? Problem

[Rails-core] SQL in Production Logs

2007-03-29 Thread [EMAIL PROTECTED]
After a brief conversation yesterday, of which this was only a small note, David suggest I mail the core list in regards to this. We're having a bizarre issue where SQL is being logged to production, regardless of even explicitly setting it to info in the configs. Of course this is generating aro

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Thijs van der Vossen
On Mar 29, 2007, at 21:35, Jeremy Kemper wrote: > On 3/29/07, Obie Fernandez <[EMAIL PROTECTED]> wrote: >> On 3/29/07, Tomas Jogin <[EMAIL PROTECTED]> wrote: >>> How about just NOT changing the default setting to this less secure >>> option? Problem solved. >> >> + 1 It sounds like the decision t

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Jeremy Kemper
On 3/29/07, Obie Fernandez <[EMAIL PROTECTED]> wrote: > On 3/29/07, Tomas Jogin <[EMAIL PROTECTED]> wrote: > > How about just NOT changing the default setting to this less secure > > option? Problem solved. > > + 1 It sounds like the decision to make cookie store the default was > premature, at b

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Michael Koziarski
> I think it's time to say that the continuous integration, break/fixed > notices should be moved to a new list. Moving them to another list will simply create an error message ghetto which no one checks. I'm happy with them here at present, and their volume is tiny relative to the discussion th

[Rails-core] using certificates with ActiveResource

2007-03-29 Thread Ben Munat
I'm trying to hack ActiveResource to use a self-signed certificate when connecting to my RESTful rails app (seems like a pretty glaring hole that it doesn't offer this out of the box... though I guess it is alpha software). I started out going through the ActiveResource code looking for somewher

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Julian Tarkhanov
On Mar 29, 2007, at 5:25 PM, Tom Ward wrote: > > +1. I'd like the notices to remain in rails-core > > Tom In fact I've reconcidered and I also give a +1 now CI is awareness and IMO the fact that errors clog the main list prompts to fix them faster -- Julian 'Julik' Tarkhanov please send all

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Tom Ward
On 29/03/07, Alexey Verkhovsky <[EMAIL PROTECTED]> wrote: > On 3/29/07, Nathaniel Brown <[EMAIL PROTECTED]> wrote: > > > > I think it's time to say that the continuous integration, break/fixed > > > > notices should be moved to a new list. > > > > Just one question: what name that new list should

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Alexey Verkhovsky
On 3/29/07, Nathaniel Brown <[EMAIL PROTECTED]> wrote: > > > > I think it's time to say that the continuous integration, break/fixed > > > notices should be moved to a new list. > Just one question: what name that new list should have? Should it be called rails-core-core or rails-notices-that-nobo

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Brad Ediger
On Mar 29, 2007, at 2:02 AM, Thijs van der Vossen wrote: On Mar 29, 2007, at 3:48, Brad Ediger wrote: On Mar 27, 2007, at 9:46 PM, S. Robert James wrote: As I said earlier, I'm waiting for a spec and sample app before working on a full review. I went ahead and wrote up a spec. Here's my fir

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Obie Fernandez
On 3/29/07, Tomas Jogin <[EMAIL PROTECTED]> wrote: > > How about just NOT changing the default setting to this less secure > option? Problem solved. + 1 It sounds like the decision to make cookie store the default was premature, at best. By the way, just because this 'feature' is in EdgeRails d

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Nathaniel Brown
No doubt then, seems you are already making procedures to silence it. I could defiately create the filter as well, but I am sure I am not the only one noticing that the emails on core would have more impact if we didn't have to sift through the commit checks. Especially as more systems are setup i

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Steve Longdo
Have any metrics been gathered on the "performance/scalability" of the new method or is it imaginary premature optimization? On 3/29/07, Isak Hansen <[EMAIL PROTECTED]> wrote: > > > On 3/21/07, S. Robert James <[EMAIL PROTECTED]> wrote: > > > > I'm concerned about the possibility of replay attacks

[Rails-core] Patch for hash order dependant test

2007-03-29 Thread Ola Bini
Hi, The applied patch changes two tests in activerecord/test/base_test.rb to not be dependent on hash ordering. The patch is against stable. Cheers -- Ola Bini (http://ola-bini.blogspot.com) JvYAML, RbYAML, JRuby and Jatha contributor System Developer, Karolinska Institutet (http://www.ki

[Rails-core] Associations and << only setting foreign key not instance

2007-03-29 Thread Simon Harris
What's the rationale for not setting the foreign instance when using << but setting it when using .create, .build, etc. Is it an oversight and should I raise a request or is it deliberate? Cheers, Simon --~--~-~--~~~---~--~~ You received this message because yo

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Thijs van der Vossen
On Mar 29, 2007, at 10:22, Sam Bravard wrote: > Short summary: someone made a well meaning change to sessions that is > broken and creates more pain than it solves. > Desired result: rollback the patch. > > DHH, what say you? The 'someone' was [1] bitsweat aka Jeremy Kemper who works for 37sign

[Rails-core] Re: Signal vs Noise?

2007-03-29 Thread Mislav Marohnić
On 3/29/07, Nathaniel Brown <[EMAIL PROTECTED]> wrote: > > > I think it's time to say that the continuous integration, break/fixed > notices should be moved to a new list. I had this filter in GMail for a long time now: Matches: *to:rubyonrails subject:("AR/Oracle Unit Test" OR SQLServer OR "

[Rails-core] Signal vs Noise?

2007-03-29 Thread Nathaniel Brown
I think it's time to say that the continuous integration, break/fixed notices should be moved to a new list. It's seriously diluting the important conversations real humans are having. As much as I thoroughly enjoy seeing the reports and status updates. It means little to nothing to me on a "live

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Tomas Jogin
How about just NOT changing the default setting to this less secure option? Problem solved. On 3/29/07, Isak Hansen <[EMAIL PROTECTED]> wrote: > > On 3/21/07, S. Robert James <[EMAIL PROTECTED]> wrote: > > > > I'm concerned about the possibility of replay attacks with cookie > > sessions. This i

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Isak Hansen
On 3/21/07, S. Robert James <[EMAIL PROTECTED]> wrote: > > I'm concerned about the possibility of replay attacks with cookie > sessions. This is a standard security issue. > Just adding my $0.02: I like the shared-nothing cookie store as an option, for performance/scalability reasons. Just docu

[Rails-core] Re: Replay attacks with cookie session

2007-03-29 Thread Sam Bravard
Someone on Caboose want to chime in and bring this thread to rest? Short summary: someone made a well meaning change to sessions that is broken and creates more pain than it solves. Desired result: rollback the patch. DHH, what say you? On Mar 29, 12:02 am, Thijs van der Vossen <[EMAIL PROTECTE