Sounds good. I'll be happy to edit if you'd like. Gary
On Sun, Nov 8, 2015 at 11:19 AM, Bernd Eckenfels <e...@zusammenkunft.net> wrote: > Hello Gary, > > if we can release a fixed version quickly I would agree, but it is not > really needed for a reply to the ongoing FUD. > > A statement would be "the dicovered vulnerability is in applications > using JavaObject serialisation from untrusted sources and not > implementing additional precaution like whitelists or restricted > classloaders, it is not in one of the many example classes used by the > POC exploits. Neighter Spring, Groovy or Apache Commons are responsible > for the security bug. > > Even tough, Apache Commons plans to add some infrastructure for > restricting the currently most often used class for "gadget chains" to > not suport de-serialisationby default. This will be provided for 3.2 > and 4.0 branches (with an programmatic and system property option > to turn the old behavior back on)" > > I havent blogged on the ASF blogs yet, but I would be willing to write > on a text like that. > > Gruss > Bernd > > > Am Sun, 8 Nov 2015 > 10:22:12 -0800 schrieb Gary Gregory <garydgreg...@gmail.com>: > > > Hi All: > > > > What about agreeing on a plan before we post anything? My proposal > > would be to follow up on an idea posted on the dev ML: Use a system > > property to enable the risky feature. This would change the default > > behavior to disallow the feature. And possibly add a new config > > option on the problematic class to control the behavior > > programatically. If the prog config would override the sys prop. We > > can release a 3.x and 4.x version once we agree on a plan and then > > blog about it again. > > > > Thoughts? > > > > Gary > > > > On Sun, Nov 8, 2015 at 10:10 AM, Gabriel Lawrence < > > gabriel.lawre...@gmail.com> wrote: > > > > > If you guys want to put together a blog post about this, Chris and > > > I would be happy to help. We've tried to be pretty clear to people > > > that this isnt a problem with the libraries, but something that > > > should be addressed by the deserializer either by not deserializing > > > from a trusted source or by hacking in their own way to whitelist > > > types allowed to be deserialized. > > > > > > I think the core message is that object instantiation is code > > > execution, don't give untrusted folks the ability to instantiate > > > arbitrary objects or you are going to have a bad day. Pulling > > > together gadgets is a painful search, but the idea that you can > > > find them all and eliminate them seems flawed. There are likely > > > going to be things in your classpath that do stuff similar to the > > > set of gadgets Chris found that rely on the apache library in tuns > > > of other class libraries as well. > > > > > > Let us know. Since this broke out on twitter we've both been trying > > > hard to get the description of the root of the problem to be > > > changed. But, it seems to have stuck for some reason... maybe > > > because having it be a simple fix is just more desirable to > > > people :-) Even when it isn't. > > > > > > gabe > > > > > > On Sun, Nov 8, 2015 at 1:41 AM, Benedikt Ritter <brit...@apache.org> > > > wrote: > > > > > > > Hi, > > > > > > > > there is a lot of bad talk going on at twitter [1,2,3] and I'm > > > > wondering whether we should respond to this via the Apache blog. > > > > > > > > Thoughts? > > > > Benedikt > > > > > > > > [1] https://twitter.com/JustineTunney/status/662937508980723712 > > > > [2] https://twitter.com/kennwhite/status/662709833464872960 > > > > [3] https://twitter.com/jodastephen/status/663253106751180800 > > > > > > > > > > > > -- > > > > http://people.apache.org/~britter/ > > > > http://www.systemoutprintln.de/ > > > > http://twitter.com/BenediktRitter > > > > http://github.com/britter > > > > > > > > > > > > > > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org > For additional commands, e-mail: dev-h...@commons.apache.org > > -- E-Mail: garydgreg...@gmail.com | ggreg...@apache.org Java Persistence with Hibernate, Second Edition <http://www.manning.com/bauer3/> JUnit in Action, Second Edition <http://www.manning.com/tahchiev/> Spring Batch in Action <http://www.manning.com/templier/> Blog: http://garygregory.wordpress.com Home: http://garygregory.com/ Tweet! http://twitter.com/GaryGregory