On 07/03/2012, at 7:55 AM, Joey Espinosa wrote:

> I agree with you on some of your points. Security can be improved if people 
> would email the support team INSTEAD OF filing a bug report (this goes for 
> any project), so that the teams know about security bugs before anybody else 
> finds them.
> 
> However, if there's a default setting or commonly set configuration choice 
> that may be questionable for security, the best course of action would be to 
> educate the Django developers and site maintainers on why it is or is not a 
> good idea to implement. The Rails community has mentioned the Homakov 
> vulnerability to the Rails team, to which their stance has been configuration 
> over convention (you're responsible for your own security).
> 
> If there's a similar situation with the Django code, and it's something 
> that's been put in intentionally by the Django team, then why not educate 
> people about this? Better to have a resource somewhere where at least one 
> Django developer on a team might have read a good security tip and share it 
> with his team, than to have a potential attacker figure it out and exploit 
> all of the Django sites that may have overlooked it. To put it in real life 
> terms, you don't combat identity theft by not talking about it, you combat it 
> by providing resources to educate the general public about how to protect 
> themselves.

Completely agreed that then education is key. However, the key statement in 
your reply is "something that's been put in intentionally by the Django team". 

All I'm asking is before anyone starts broadcasting details about a 
"vulnerability", that they take the time to contact the core team on 
secur...@djangoproject.com to determine whether the code and it's side effects 
actually *are* intentional. You *might* have discovered something that has been 
done intentionally, with full knowledge of the consequences. It *might* be a 
case where we need to rely on education -- improve Django's own docs, and 
encourage people like yourself to blog about how to "do it right". However, it 
might also be a case where we hadn't fully considered all the consequences, in 
which case, we'd like the opportunity to address the problem before it becomes 
widespread public knowledge.

In short -- err on the side of caution. It costs nothing to mail 
secur...@djangoproject.com. If you have found a serious problem, we'll give 
credit where it's due. If not, we'll let you know you can start educating the 
world about what they're doing wrong.

Yours,
Russ Magee %-)

-- 
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com.
To unsubscribe from this group, send email to 
django-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en.

Reply via email to