On 07/03/2012, at 7:55 AM, Joey Espinosa wrote: > I agree with you on some of your points. Security can be improved if people > would email the support team INSTEAD OF filing a bug report (this goes for > any project), so that the teams know about security bugs before anybody else > finds them. > > However, if there's a default setting or commonly set configuration choice > that may be questionable for security, the best course of action would be to > educate the Django developers and site maintainers on why it is or is not a > good idea to implement. The Rails community has mentioned the Homakov > vulnerability to the Rails team, to which their stance has been configuration > over convention (you're responsible for your own security). > > If there's a similar situation with the Django code, and it's something > that's been put in intentionally by the Django team, then why not educate > people about this? Better to have a resource somewhere where at least one > Django developer on a team might have read a good security tip and share it > with his team, than to have a potential attacker figure it out and exploit > all of the Django sites that may have overlooked it. To put it in real life > terms, you don't combat identity theft by not talking about it, you combat it > by providing resources to educate the general public about how to protect > themselves.
Completely agreed that then education is key. However, the key statement in your reply is "something that's been put in intentionally by the Django team". All I'm asking is before anyone starts broadcasting details about a "vulnerability", that they take the time to contact the core team on secur...@djangoproject.com to determine whether the code and it's side effects actually *are* intentional. You *might* have discovered something that has been done intentionally, with full knowledge of the consequences. It *might* be a case where we need to rely on education -- improve Django's own docs, and encourage people like yourself to blog about how to "do it right". However, it might also be a case where we hadn't fully considered all the consequences, in which case, we'd like the opportunity to address the problem before it becomes widespread public knowledge. In short -- err on the side of caution. It costs nothing to mail secur...@djangoproject.com. If you have found a serious problem, we'll give credit where it's due. If not, we'll let you know you can start educating the world about what they're doing wrong. Yours, Russ Magee %-) -- You received this message because you are subscribed to the Google Groups "Django users" group. To post to this group, send email to django-users@googlegroups.com. To unsubscribe from this group, send email to django-users+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/django-users?hl=en.