donaldstufft | 12 years ago | on: Python on Wheels
donaldstufft's comments
donaldstufft | 12 years ago | on: Python on Wheels
donaldstufft | 12 years ago | on: Python on Wheels
donaldstufft | 12 years ago | on: Python on Wheels
I have plans for either turning PyPI into a build farm, or making a secondary service that acts as a build farm for PyPI. We've just been more focused on cleaning up other issues.
donaldstufft | 12 years ago | on: PyPI Migrated to New Infrastructure
donaldstufft | 12 years ago | on: Bug #9424: ruby 1.9 & 2.x has insecure SSL/TLS client defaults
However the fact that other people should also be claiming responsibility for their own security does not absolve ruby of it's own responsibilities.
donaldstufft | 12 years ago | on: About Python 3
donaldstufft | 12 years ago | on: How and why writing crypto is hard (2012)
The state of crypto in Python is horrendous, hence the new library.
donaldstufft | 12 years ago | on: How and why writing crypto is hard (2012)
The lower level APIs we are exposing will hopefully be more easy to use as well, but they will not offer the same protections against mistakes the same as the higher level API would.
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
2) The above addon does have it. I have no idea what bitbucket does.
3) Not sure I understand what this means, you mean if there is a valid XSS on a subdomain?
Decoupling CSRF and Sessions has been a requirement for us for awhile now. We've spoken a little bit about optionally coupling them where if you have the session framework enabled it will couple them but if you don't it falls back on the current method.
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
This area of things isn't my strong suite, but assuming that this is analogous to just adding random data to the response, I believe that simply adding random data to the response can be worked around by doing more requests as using statistics to factor out the noise introduced.
If my understanding is wrong then excuse me :)
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
A CSRF request from a plaintext subdomain would not include a header and would fail Django's CSRF for lacking a referrer header (Strict referrer checking only available under HTTPS). Further more even a subdomain under TLS would fail to have the same origin.
A subdomain can set cookies this is true. This requires a XSS on the subdomain or allowing plaintext responses on subdomains. If you do not ensure both of these then besides being able to set (or in the case of XSS, read) the CSRF token you can also fixate the session, steal the session, preform a DoS using the size of the cookie, etc.
The solution is forced TLS with HSTS and includeSubdomains.
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
donaldstufft | 12 years ago | on: Security advisory: Breach and Django
In any case that you can edit the CSRF token you already can execute a much stronger attack (MITM, XSS, etc). If you have a way to set your own arbitrary cookie that doesn't require a much work attack that already includes the ability to do arbitrary requests without them needing to be cross origin then I heartily suggest you report it.
donaldstufft | 12 years ago | on: Why Package Signing is not the Holy Grail
donaldstufft | 12 years ago | on: Why Package Signing is not the Holy Grail
donaldstufft | 12 years ago | on: Why Package Signing is not the Holy Grail
Source of Trust, not Source of The Thing You Downloaded. The author would still sign the package, it's just how do you get from where you're at to trusting that person. The way that browsers, most (All?) Linux distributions, Microsoft etc work is by hard baking a list of trust roots. This has the effect that we have in the modern CA system where because there's a hard baked system and the trust relationship is between the "author" and the source of trust that you can't reasonably not trust say Verisign or a significant portion of the internet breaks. It's about Trust Agility not about trusting the place you downloaded the package from. It's an idea similar to http://convergence.io/.
donaldstufft | 12 years ago | on: Why Package Signing is not the Holy Grail
But you're right something somewhere has to give because nothing is 100%. I hoped to show people that things aren't 100% and just slapping some crypto in there isn't going to give the results they were hoping for.