On Tuesday 17 Nov 2009 8:46:31 am Mike Ramirez wrote: > On Monday 16 November 2009 18:08:35 Kenneth Gonsalves wrote: > > On Monday 16 Nov 2009 10:44:27 pm Mike Ramirez wrote: > > > > it is precisely this assumption that does not seem logical to me. But > > > > frankly I do not know how to counter it ;-) > > > > > > How is it not logical? Product A is widely used, Product B is used > > > less. Bad Guy A. is smart enough to realize that product A if broken > > > can be used to gain him more presents because more users have it. > > > > > > so if we follow your logic to the inevitable conclusion, the moment the > > bad guys train their weapons on django it is going to be shot as full of > > holes as drupal (or even phpbb). > > No, I did say 'product A if broken' -- keyword being if. > > But Bad Guy A will try everything to put holes in django, and whats worse > is that he'll have a different perspective than you or I and might see > something that we didn't or someone else didn't and walla, we have a > hole. We all know there is potential for security problems in well > established software that aren't discovered today, because of this and > human error in future revisions and changes. Now am I saying the django > devs are lazy or incompetent? If I really believed that I would be using > something else and calling you all idiots for using a badly developed > piece of software. No, I'm calling them human, if they aren't human, then > well aliens are finally proven. > > > In which case why are the devels focussing so > > much of their time trying to make the app safe and secure? > > Should they not > > be better of lighting candles in the rain and praying that the bad guys > > radar doesn't function? > > I personally am of the opinion that constant > > harping on safe practices and not doing silly things like permitting > > code inside html (for example) will create an inherently safer app - and > > the bad guys will congregate elsewhere. After all bitbucket is big enough > > to be on their radar - and it got hosed - although I hear that was an > > amazon problem, not a django issue (could be wrong). > > > > Open source helps this a lot, lets not forget this. > > PHP application problems that we see are bad coding techniques, mostly in > older software that's been coded since php4 and updated for later versions > of php, which says to me that they didn't take into account half of the > known vulns today because they weren't known yesterday. > > We also have to take into account all the ways a user might try to use our > software, because they are lazy and not always vigilent, which is the main > area that bad guys prey on. For example, redirecting after a login to > break the back button so the next user can't get the login form details. > It's hard to speculate everything a person will do, too many individuals > with different view points. Even using large test groups it's hard be > 100% correct 100% of the time. > > > In the end all you can do is prevent what is known today, hope that you've > covered for tomorrow. >
anyway, in pitching for django (in particular), python and postgresql in general, I put safe code as number one in the list. And I personally am confident (after seeing the work done in the last 5 years in django, python and postgresql) that this will remain. Holes will appear - but I have a feeling they will be few and far between and patched fast too. This is what I tell people. -- regards Kenneth Gonsalves Senior Project Officer NRC-FOSS http://nrcfosshelpline.in/web/ -- You received this message because you are subscribed to the Google Groups "Django users" group. To post to this group, send email to django-us...@googlegroups.com. To unsubscribe from this group, send email to django-users+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/django-users?hl=.