Created pull request, changed the approach a bit: https://github.com/Pylons/pyramid/pull/695
On Sun, Sep 23, 2012 at 4:05 PM, Chris McDonough <chr...@plope.com> wrote: > On Sun, 2012-09-23 at 06:54 -0700, Florian Rüchel wrote: > > > > > > On Sunday, September 23, 2012 3:11:51 PM UTC+2, Chris McDonough wrote: > > On Sun, 2012-09-23 at 05:54 -0700, Florian Rüchel wrote: > > > > > > How about a script that's part of the framework > > itself? We > > > have pserve, > > > pcreate... how about > > > > > > pkeygen [-w <filename>] > > > > > > or > > > > > > pyramid-keygen [-w <filename>] > > > > > > I like this idea very much. I would like to either get this > > usage > > > approved or I would just build a simple function inside > > pyramid. > > > However, such a function belongs more into an installation > > than into > > > application code. Can you tell me how to build such a script > > that runs > > > on both Windows and Linux? I would like to see it > > implemented in this > > > way if Chris approves. > > > > Who will use it and when would they use it? > > > > Well it will be used by the user deploying the application. This can > > be the developer or even multiple end-users (if the application itself > > is distributed). In both cases there would be a simple deployment > > instruction: > > "Upon installation you need to execute 'pyramid-keygen -w > > cookie_secret -b 256'" or similar. Then you have a secret file and can > > use it in your application. Otherwise each developer has to develop > > their own method of generating such a secret during the deployment > > process. Furthermore, we could then add a hint to the documentation to > > use this if they want a strong secret (see below). > > There's currently no machinery in Pyramid that can use a "secret file". > Instead, developers are expected to add a secret value to their .ini > file and use it as input to the AuthTktAuthenticationPolicy constructor. > So I'd be -1 on something that created a file, unless there's some other > use case that this sweater-thread of a topic has convinced us must be > implemented along the lines of "the secret must be in another file". > > If the purpose is only to output a "sufficiently random" string, then I > personally don't think we need to get into the business of supplying > software that does that, although we might supply documentation for UNIX > and for Windows that helps people do that using third-party tools. If > that turns out to be untenable for some reason, then I might reconsider > writing software that helps. > > > > On a seperate note: I have started on improving the > > documentation. As > > > a first step, I have edited the `narr/authentication.rst` to > > include a > > > note and have documented the API for > > > `pyramid.authentication.AuthTktAuthenticationPolicy` > > (better > > > documentation for secret, add documentation for hashalg). My > > question > > > is now how would you handle this in regards to the > > documentation. I > > > thought about adding this (or a similar) note everywhere > > this policy > > > is used. This should raise the awareness everywhere the docs > > are read > > > (e.g. tutorials). Furthermore, since we would clearly > > recommend to use > > > something like SHA256 if MD5 is not explicitly needed, > > should we > > > change the code examples to include a better hashalg > > (instead of just > > > documenting it)? I would vote for a yes, since I don't see > > any > > > disadvantage: If you build a new application, you should > > always use > > > another algorithm and as shown above mod_auth_tkt can also > > easily > > > handle other algorithms if configured correctly. > > > > I didn't know we already had a mergeable patch for the hashalg > > stuff. > > The last patch I saw seemed maybe a little overwrought. Until > > we figure > > that out, I'd hold off on changing docs. > > > > Yeah, I took a step back, changed it to be only a callable and made it > > very simple again. Take look at the corresponding commit and tell me > > if it is still too much. > > I'll defer to Domen on this. > > > > > If you approve, I would really recommend changing the docs at least in > > regards to a notice that the default behavior is at least not *that* > > secure. > > Proceeding one step at a time. > > - C > > > > -- > You received this message because you are subscribed to the Google Groups > "pylons-devel" group. > To post to this group, send email to pylons-devel@googlegroups.com. > To unsubscribe from this group, send email to > pylons-devel+unsubscr...@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/pylons-devel?hl=en. > > -- You received this message because you are subscribed to the Google Groups "pylons-devel" group. To post to this group, send email to pylons-devel@googlegroups.com. To unsubscribe from this group, send email to pylons-devel+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/pylons-devel?hl=en.