Hi Erik

I've tried to subscribe to the mailing list, but sourceforge doesn't like my ISP
for some reason.. I'm looking into it, but in the meantime I thought I would
just e-mail you.


I've subscribed you manually. SF recently changed their spam filtering rules. Last week I too was unable to post to this list because, when you post, their server appears to evaluate the From: address. It connects to the From: address' mail server and does a RCPT TO. In my case, my server rejected SF's mail server doing a RCPT TO because SF's mail server was in the Spamcop real time block list. To get around it, I had to add SF's mail server to my whitelist of allowed mail servers. Thus it could RCPT TO (despite being blacklisted in Spamcop) and I could send messages. SF really need to address the spam issue. Every day I need to manually delete at least four spam messages that people try to send to this list. Even their new RCPT TO of the From: address isn't a solution, because the offending From: addresses are probably valid (being customer service addresses from well-known companies like PayPal and eBay). A solution that would work is replying to all messages posted by non-members of a list, and requiring them to manually confirm via an obfuscated image. This would automate a validation step that currently has to be manually done by project admins.

There was a local variable added to HttpSessionContextIntegrationFilter called
httpSessionExistedAtStartOfRequest.  This is a great idea, but it wasn't quite
enough for us.  In order to facilitate a proper logout, we found the need to
actually verify the sessionIDs of the session at the start & end of the filter,
to see if they had changed.   When we invalidated the current session, there
were things in place that would cause a new one to be created- then ACEGI would
pick up the new session and store the user in it.  I'm not sure if that's
expected behavior or not, but for us it was undesirable. Here is a patch we
made that catches this scenario and makes sure the user stays logged out. (diff
is against v0.8.1)



Could you please explain in a little more detail why the existing approach doesn't work properly for you? I am not sure this is an Acegi Security issue. The "things in place that would cause a new one to be created" probably need addressing instead. If you are invalidating a session, and then something else is re-generating it, I don't think making Acegi Security detect this and respond in a special way is the optimal approach. You'll have superfluous sessions laying around at best, so I'd firstly encourage looking at whatever is re-creating the session.

Cheers
Ben


------------------------------------------------------- This SF.Net email is sponsored by Oracle Space Sweepstakes Want to be the first software developer in space? Enter now for the Oracle Space Sweepstakes! http://ads.osdn.com/?ad_id=7412&alloc_id=16344&op=click _______________________________________________ Home: http://acegisecurity.sourceforge.net Acegisecurity-developer mailing list Acegisecurity-developer@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/acegisecurity-developer

Reply via email to