[Zope-Checkins] SVN: Zope/hotfixes/Products.Zope_Hotfix_20111024/ Hotfix for vulnerability reported today.

2011-10-24 Thread Tres Seaver
Log message for revision 123147:
  Hotfix for vulnerability reported today.

Changed:
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/tags/
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/

-=-
___
Zope-Checkins maillist  -  Zope-Checkins@zope.org
https://mail.zope.org/mailman/listinfo/zope-checkins


[Zope-Checkins] SVN: Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/ Add hotfix for vulnerability reported today.

2011-10-24 Thread Tres Seaver
Log message for revision 123148:
  Add hotfix for vulnerability reported today.

Changed:
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/CHANGES.txt
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/
  A   
Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/Zope_Hotfix_20111024/
  A   
Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/Zope_Hotfix_20111024/__init__.py
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/__init__.py
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/README.txt
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/setup.py

-=-
Added: Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/CHANGES.txt
===
--- Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/CHANGES.txt   
(rev 0)
+++ Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/CHANGES.txt   
2011-10-24 21:46:18 UTC (rev 123148)
@@ -0,0 +1,8 @@
+'Products.Zope_Hotfix_20111024' Changelog
+=
+
+
+1.0 (2011-10-24)
+
+
+- Initial release.

Added: 
Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/Zope_Hotfix_20111024/__init__.py
===
--- 
Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/Zope_Hotfix_20111024/__init__.py
 (rev 0)
+++ 
Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/Zope_Hotfix_20111024/__init__.py
 2011-10-24 21:46:18 UTC (rev 123148)
@@ -0,0 +1,4 @@
+def initialize(context):
+from AccessControl.User import BasicUserFolder
+from App.class_init import InitializeClass
+InitializeClass(BasicUserFolder)

Added: Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/__init__.py
===
--- Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/__init__.py  
(rev 0)
+++ Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/Products/__init__.py  
2011-10-24 21:46:18 UTC (rev 123148)
@@ -0,0 +1,6 @@
+# See http://peak.telecommunity.com/DevCenter/setuptools#namespace-packages
+try:
+__import__('pkg_resources').declare_namespace(__name__)
+except ImportError:
+from pkgutil import extend_path
+__path__ = extend_path(__path__, __name__)

Added: Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/README.txt
===
--- Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/README.txt
(rev 0)
+++ Zope/hotfixes/Products.Zope_Hotfix_20111024/trunk/README.txt
2011-10-24 21:46:18 UTC (rev 123148)
@@ -0,0 +1,78 @@
+'Products.Zope_Hotfix_20111024' README
+==
+
+Overview
+
+
+This hotfix addresses a serious vulnerability in the Zope2 application
+server.  Affected versions of Zope2 include:
+
+- 2.12.x = 2.12.20
+
+- 2.13.x = 2.13.6
+
+Older releases (2.11.x, 2.10.x, etc.) are not vulnerable.
+
+The Zope2 security response team recommends that all users of these 
+releases upgrade to an unaffected release (2.12.21 or 2.13.11) as soon as
+they become available.
+
+Until that upgrade is feasible, deploying this hotfix also mitigates the
+vulnerability.
+
+
+Installing the Hotfix:  Via 'easy_install'
+---
+
+If the Python which runs your Zope instance has 'setuptools' installed (or
+is a 'virtualenv'), you can install the hotfix directly from PyPI::
+
+  $ /prefix/bin/easy_install Products.Zope_Hotfix_20111024
+
+and then restart the Zope instance, e.g.:
+
+  $ /path/to/instance/bin/zopectl restart
+
+
+Installing the Hotfix:  Via 'zc.buildout'
+-
+
+If your Zope instance is managed via 'zc.buildout', you can install
+the hotfix directly from PyPI.  Edit the 'buildout.cfg' file, adding
+Products.Zope_Hotfix_20111024 to the eggs section of the instance.
+E.g.::
+
+  [instance]
+  recipe = plone.recipe.zope2instance
+  #...
+  eggs =
+${buildout:eggs}
+Products.Zope_Hotfix_20111024
+
+Next, re-run the buildout::
+
+  $ /path/to/buildout/bin/buildout
+
+and then restart the Zope instance, e.g.:
+
+  $ /path/to/buildout/bin/instance restart
+
+
+Installing the Hotfix:  Manual Installation
+---
+
+You may also install this hotfix by unpacking the tarball and adding a
+'products' key to the 'etc/zope.conf' of your instance.   E.g.::
+
+  products /path/to/Products.Zope_Hotfix_20111024/Products
+
+
+Verifying the Installation
+--
+
+After restarting the Zope instance, check the 'Control_Panel/Products'
+folder in the Zope Management Interface, e.g.:
+
+  http://localhost:8080/Control_Panel/Products/manage_main
+
+You should see the 'Zope_Hotfix_20111024' product folder there.

Added: 

[Zope-Checkins] SVN: Zope/hotfixes/Products.Zope_Hotfix_20111024/tags/1.0/ Tag hotfix for vulnerability reported today.

2011-10-24 Thread Tres Seaver
Log message for revision 123149:
  Tag hotfix for vulnerability reported today.

Changed:
  A   Zope/hotfixes/Products.Zope_Hotfix_20111024/tags/1.0/

-=-
___
Zope-Checkins maillist  -  Zope-Checkins@zope.org
https://mail.zope.org/mailman/listinfo/zope-checkins


[Zope-Checkins] SVN: Zope/branches/2.12/ Fix serious authentication vulnerability in stock configuration.

2011-10-24 Thread Tres Seaver
Log message for revision 123150:
  Fix serious authentication vulnerability in stock configuration.
  

Changed:
  U   Zope/branches/2.12/doc/CHANGES.rst
  U   Zope/branches/2.12/src/AccessControl/User.py

-=-
Modified: Zope/branches/2.12/doc/CHANGES.rst
===
--- Zope/branches/2.12/doc/CHANGES.rst  2011-10-24 21:47:09 UTC (rev 123149)
+++ Zope/branches/2.12/doc/CHANGES.rst  2011-10-24 22:23:09 UTC (rev 123150)
@@ -8,6 +8,7 @@
 2.12.21 (unreleased)
 
 
+- Fixed serious authentication vulnerability in stock configuration.
 
 2.12.20 (2011-10-04)
 

Modified: Zope/branches/2.12/src/AccessControl/User.py
===
--- Zope/branches/2.12/src/AccessControl/User.py2011-10-24 21:47:09 UTC 
(rev 123149)
+++ Zope/branches/2.12/src/AccessControl/User.py2011-10-24 22:23:09 UTC 
(rev 123150)
@@ -1027,7 +1027,9 @@
  returns true if domain auth mode is set to true
 return getattr(self, '_domain_auth_mode', None)
 
+InitializeClass(BasicUserFolder)
 
+
 class UserFolder(BasicUserFolder):
 
 Standard UserFolder object

___
Zope-Checkins maillist  -  Zope-Checkins@zope.org
https://mail.zope.org/mailman/listinfo/zope-checkins


[Zope-Checkins] SVN: Zope/branches/2.12/src/AccessControl/tests/testUser.py Add a unittest for today's fix.

2011-10-24 Thread Tres Seaver
Log message for revision 123151:
  Add a unittest for today's fix.

Changed:
  U   Zope/branches/2.12/src/AccessControl/tests/testUser.py

-=-
Modified: Zope/branches/2.12/src/AccessControl/tests/testUser.py
===
--- Zope/branches/2.12/src/AccessControl/tests/testUser.py  2011-10-24 
22:23:09 UTC (rev 123150)
+++ Zope/branches/2.12/src/AccessControl/tests/testUser.py  2011-10-24 
22:29:40 UTC (rev 123151)
@@ -227,7 +227,15 @@
 # TODO class Test_readUserAccessFile(unittest.TestCase)
 
 
-# TODO class BasicUserFoldertests(unittest.TestCase)
+class BasicUserFolderTests(unittest.TestCase):
+ 
+def _getTargetClass(self):
+from AccessControl.User import BasicUserFolder
+return BasicUserFolder
+ 
+def test_manage_users_security_initialized(self):
+uf = self._getTargetClass()()
+self.assertTrue(hasattr(uf, 'manage_users__roles__'))
 
 
 class UserFolderTests(unittest.TestCase):
@@ -494,11 +502,12 @@
 
 
 def test_suite():
-suite = unittest.TestSuite()
-suite.addTest(unittest.makeSuite(BasicUserTests))
-suite.addTest(unittest.makeSuite(SimpleUserTests))
-suite.addTest(unittest.makeSuite(SpecialUserTests))
-suite.addTest(unittest.makeSuite(UnrestrictedUserTests))
-suite.addTest(unittest.makeSuite(NullUnrestrictedUserTests))
-suite.addTest(unittest.makeSuite(UserFolderTests))
-return suite
+return unittest.TestSuite((
+unittest.makeSuite(BasicUserTests),
+unittest.makeSuite(SimpleUserTests),
+unittest.makeSuite(SpecialUserTests),
+unittest.makeSuite(UnrestrictedUserTests),
+unittest.makeSuite(NullUnrestrictedUserTests),
+unittest.makeSuite(BasicUserFolderTests),
+unittest.makeSuite(UserFolderTests),
+))

___
Zope-Checkins maillist  -  Zope-Checkins@zope.org
https://mail.zope.org/mailman/listinfo/zope-checkins


[Zope-Checkins] SVN: Zope/branches/2.13/ Fix serious authentication vulnerability in stock configuration.

2011-10-24 Thread Tres Seaver
Log message for revision 123152:
  Fix serious authentication vulnerability in stock configuration.
  

Changed:
  U   Zope/branches/2.13/doc/CHANGES.rst
  U   Zope/branches/2.13/src/OFS/tests/test_userfolder.py
  U   Zope/branches/2.13/src/OFS/userfolder.py

-=-
Modified: Zope/branches/2.13/doc/CHANGES.rst
===
--- Zope/branches/2.13/doc/CHANGES.rst  2011-10-24 22:29:40 UTC (rev 123151)
+++ Zope/branches/2.13/doc/CHANGES.rst  2011-10-24 22:39:13 UTC (rev 123152)
@@ -8,6 +8,7 @@
 2.13.11 (unreleased)
 
 
+- Fixed serious authentication vulnerability in stock configuration.
 
 2.13.10 (2011-10-04)
 

Modified: Zope/branches/2.13/src/OFS/tests/test_userfolder.py
===
--- Zope/branches/2.13/src/OFS/tests/test_userfolder.py 2011-10-24 22:29:40 UTC 
(rev 123151)
+++ Zope/branches/2.13/src/OFS/tests/test_userfolder.py 2011-10-24 22:39:13 UTC 
(rev 123152)
@@ -17,7 +17,15 @@
 # TODO class Test_readUserAccessFile(unittest.TestCase)
 
 
-# TODO class BasicUserFoldertests(unittest.TestCase)
+class BasicUserFolderTests(unittest.TestCase):
+ 
+def _getTargetClass(self):
+from OFS.userfolder import BasicUserFolder
+return BasicUserFolder
+ 
+def test_manage_users_security_initialized(self):
+uf = self._getTargetClass()()
+self.assertTrue(hasattr(uf, 'manage_users__roles__'))
 
 
 class UserFolderTests(unittest.TestCase):
@@ -171,6 +179,8 @@
 
 
 def test_suite():
-suite = unittest.TestSuite()
-suite.addTest(unittest.makeSuite(UserFolderTests))
+suite = unittest.TestSuite((
+unittest.makeSuite(BasicUserFolderTests),
+unittest.makeSuite(UserFolderTests),
+))
 return suite

Modified: Zope/branches/2.13/src/OFS/userfolder.py
===
--- Zope/branches/2.13/src/OFS/userfolder.py2011-10-24 22:29:40 UTC (rev 
123151)
+++ Zope/branches/2.13/src/OFS/userfolder.py2011-10-24 22:39:13 UTC (rev 
123152)
@@ -293,7 +293,9 @@
 message='Cannot change the id of a UserFolder',
 action='./manage_main'))
 
+InitializeClass(BasicUserFolder)
 
+
 class UserFolder(accesscontrol_userfolder.UserFolder, BasicUserFolder):
 Standard UserFolder object
 

___
Zope-Checkins maillist  -  Zope-Checkins@zope.org
https://mail.zope.org/mailman/listinfo/zope-checkins


[Zope-Checkins] SVN: Zope/trunk/ Fix serious authentication vulnerability in stock configuration.

2011-10-24 Thread Tres Seaver
Log message for revision 123153:
  Fix serious authentication vulnerability in stock configuration.
  

Changed:
  U   Zope/trunk/doc/CHANGES.rst
  U   Zope/trunk/src/OFS/tests/test_userfolder.py
  U   Zope/trunk/src/OFS/userfolder.py

-=-
Modified: Zope/trunk/doc/CHANGES.rst
===
--- Zope/trunk/doc/CHANGES.rst  2011-10-24 22:39:13 UTC (rev 123152)
+++ Zope/trunk/doc/CHANGES.rst  2011-10-24 22:41:46 UTC (rev 123153)
@@ -11,6 +11,8 @@
 Bugs Fixed
 ++
 
+- Fixed serious authentication vulnerability in stock configuration.
+
 - Fixed a regression in webdav support that broke external editor feature.
 
 - Restore ability to undo multiple transactions from the ZMI by using the

Modified: Zope/trunk/src/OFS/tests/test_userfolder.py
===
--- Zope/trunk/src/OFS/tests/test_userfolder.py 2011-10-24 22:39:13 UTC (rev 
123152)
+++ Zope/trunk/src/OFS/tests/test_userfolder.py 2011-10-24 22:41:46 UTC (rev 
123153)
@@ -17,7 +17,15 @@
 # TODO class Test_readUserAccessFile(unittest.TestCase)
 
 
-# TODO class BasicUserFoldertests(unittest.TestCase)
+class BasicUserFolderTests(unittest.TestCase):
+ 
+def _getTargetClass(self):
+from OFS.userfolder import BasicUserFolder
+return BasicUserFolder
+ 
+def test_manage_users_security_initialized(self):
+uf = self._getTargetClass()()
+self.assertTrue(hasattr(uf, 'manage_users__roles__'))
 
 
 class UserFolderTests(unittest.TestCase):
@@ -171,6 +179,8 @@
 
 
 def test_suite():
-suite = unittest.TestSuite()
-suite.addTest(unittest.makeSuite(UserFolderTests))
+suite = unittest.TestSuite((
+unittest.makeSuite(BasicUserFolderTests),
+unittest.makeSuite(UserFolderTests),
+))
 return suite

Modified: Zope/trunk/src/OFS/userfolder.py
===
--- Zope/trunk/src/OFS/userfolder.py2011-10-24 22:39:13 UTC (rev 123152)
+++ Zope/trunk/src/OFS/userfolder.py2011-10-24 22:41:46 UTC (rev 123153)
@@ -293,7 +293,9 @@
 message='Cannot change the id of a UserFolder',
 action='./manage_main'))
 
+InitializeClass(BasicUserFolder)
 
+
 class UserFolder(accesscontrol_userfolder.UserFolder, BasicUserFolder):
 Standard UserFolder object
 

___
Zope-Checkins maillist  -  Zope-Checkins@zope.org
https://mail.zope.org/mailman/listinfo/zope-checkins


Re: [Zope-dev] zope-tests - FAILED: 21, OK: 31

2011-10-24 Thread Brian Sutherland
On Thu, Oct 20, 2011 at 11:58:09AM -0400, Tres Seaver wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
  [1]FAILED  ZTK 1.0dev / Python2.4.6 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051353.html
 
  
  
  [2]FAILED  ZTK 1.0dev / Python2.5.5 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051351.html
 
  
  
  [3]FAILED  ZTK 1.0dev / Python2.6.5 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051352.html
 
 These
  
 are all failing due to a missing version pin for 'six', which
 should not happen:  the ZTK 1.0 package set should not include the new
 version of 'zope.schema' which introduced this dependency.
 
 
  [4]FAILED  ZTK 1.1 / Python2.5.5 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051398.html
 
  
  
  [5]FAILED  ZTK 1.1 / Python2.6.5 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051397.html
 
  
  
  [6]FAILED  ZTK 1.1 / Python2.7.2 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051396.html
 
 This
  
 failure is due to the unexpected presence of a 'Data.fs' file in
 what is supposed to be a newly-created tempdir.  I don't understand
 how that is supposed to work, but the bug seems real.
 
 
  [7]FAILED  ZTK 1.1dev / Python2.5.5 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051354.html
 
 Syntax
  
 errors due to Py3k compatibility changes in 'zope.schema'.  The
 ZTK 1.1dev checkouts pull in the trunk of 'zope.schema', which is
 now backward-incompatible (it drops support for Python 2.5).  I think
 we should be creating a '3.8' branch of 'zope.schema' (copied from
 3.8.1), and make the ZTK 1.1dev checkout use that.

Thanks for fixing these. I didn't realize that the buildouts would break
because of my change. I should have though.

(I've also given up looking at the buildout perma-failures a long time ago)

 Meanwhile, I
 think we should update the 'zope.schema' trunk to indicate that it is
 targeting a new major version, 4.0, due to new dependencies and
 dropping Python 2.5 compatibility.

I've done this.

  [8]FAILED  ZTK 1.1dev / Python2.6.5 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051356.html
 
 There
  
 is an odd 'zope.testrunner' failure here:
 
  Usage: test [options] [MODULE] [TEST]
 
  test: error: option --profile: invalid choice: 'cProfile' (choose from )
 
 
  Failure in test
 /home/ccomb/ztk1.1dev-slave/Python2.6.5-Linux-64bit/build/src/zope.testrunner/src/zope/testrunner/testrunner-subunit.txt
  Failed doctest test for testrunner-subunit.txt
 
 And also the unexpected Data.fs issue which affected #4, 5, and 6.
 
 
  [9]FAILED  ZTK 1.1dev / Python2.7.2 Linux 64bit 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051355.html
 
 This
  
 is the unexpected Data.fs issue which affected #4, 5, and 6.
 
 
 I'm ignoring the 'z3c.*' failures:  I still want these tests either
 fixed or else dropped from the daily report.
 
 
  [21]   FAILED  winbot / ztk_dev py_254_win32 
  https://mail.zope.org/pipermail/zope-tests/2011-October/051382.html
 
 This
  
 is the same Python 2.5 incompatibility problem which afflicts #7.

This is a tricky issue, there are 2 parts:

* Supporting python 2.5 in zope.schema is not hard, but will make
  the code quite ugly (no class decorator for implements)
* I'm not sure if the next version of the ZTK will need to support
  Python 2.5

So there seem to be 3 options to fix this buildout issue:

1. Point the ZTK trunk at the zope.schema 3.8 branch
2. Make the zope.schema code uglier and support 2.5
3. Declare that the next ZTK version drops support for 2.5 and stop
   the buildbot for Python 2.5 + ZTK trunk

I'm partial to option 1 to get the buildbot working and defer the Python
2.5/ugly code decision to later.

-- 
Brian Sutherland
___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


Re: [Zope-dev] zope-tests - FAILED: 21, OK: 31

2011-10-24 Thread Tres Seaver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/24/2011 07:24 AM, Brian Sutherland wrote:
 On Thu, Oct 20, 2011 at 11:58:09AM -0400, Tres Seaver wrote:

 Syntax errors due to Py3k compatibility changes in 'zope.schema'.
 The ZTK 1.1dev checkouts pull in the trunk of 'zope.schema',
 which is now backward-incompatible (it drops support for Python
 2.5).  I think we should be creating a '3.8' branch of
 'zope.schema' (copied from 3.8.1), and make the ZTK 1.1dev
 checkout use that.
 
 Thanks for fixing these. I didn't realize that the buildouts would
 break because of my change. I should have though.
 
 (I've also given up looking at the buildout perma-failures a long
 time ago)

We should probably look at *all* '/trunk' dependencies in the ZTK as
future sources of such problems:  people working on trunk development
know that the released ZTK pins versions, but may not realize that the
'-dev' checkouts are possibly affected.

Preemptively switching ZTK dev checkouts to use only release branches
would make that problem go away, but at the cost of requiring
bugfix-only changes to be backported:  today, in many packages, the
trunk remains identical to a release branch for a long time.

Rather than such a drastic step, I think we need to adopt a new policy
that the developer who makes the first non-bugfix change to the
trunk (i.e., adding a new feature or dependency, a
backward-incompatibility, or dropping support for a Python version) is
also responsible for finding an fixing any ZTK breakage (e.g., by
creating the release branch and changing the ZTK configuration to use it).


 [21]   FAILED  winbot / ztk_dev py_254_win32 
 https://mail.zope.org/pipermail/zope-tests/2011-October/051382.html


 
This is the same Python 2.5 incompatibility problem which afflicts #7.
 
 This is a tricky issue, there are 2 parts:
 
 * Supporting python 2.5 in zope.schema is not hard, but will make 
 the code quite ugly (no class decorator for implements) * I'm not
 sure if the next version of the ZTK will need to support Python
 2.5
 
 So there seem to be 3 options to fix this buildout issue:
 
 1. Point the ZTK trunk at the zope.schema 3.8 branch 2. Make the
 zope.schema code uglier and support 2.5 3. Declare that the next
 ZTK version drops support for 2.5 and stop the buildbot for Python
 2.5 + ZTK trunk
 
 I'm partial to option 1 to get the buildbot working and defer the
 Python 2.5/ugly code decision to later.

I also prefer that we drop 2.5 compatibility on the ZTK trunk.  The
2.5.6 release page says[1]:

  This release is most likely the final release of Python 2.5; under
  the current release policy, no security issues in Python 2.5 will be
  fixed after October, 2011.

[1] http://www.python.org/download/releases/2.5.6/



Tres.
- -- 
===
Tres Seaver  +1 540-429-0999  tsea...@palladion.com
Palladion Software   Excellence by Designhttp://palladion.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6lf24ACgkQ+gerLs4ltQ53lgCcCAuxGG5Up+0XfFRquXyaLxtK
XiMAnjhY+HzfjTddr3afk8kk66U345C/
=BJmV
-END PGP SIGNATURE-

___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


Re: [Zope-dev] zope-tests - FAILED: 21, OK: 31

2011-10-24 Thread Hanno Schlichting
On Mon, Oct 24, 2011 at 5:08 PM, Tres Seaver tsea...@palladion.com wrote:
 I also prefer that we drop 2.5 compatibility on the ZTK trunk.  The
 2.5.6 release page says[1]:

  This release is most likely the final release of Python 2.5; under
  the current release policy, no security issues in Python 2.5 will be
  fixed after October, 2011.

 [1] http://www.python.org/download/releases/2.5.6/

Fine by me. We have ZTK 1.1 which can keep Python 2.5 support.

For Zope 2, we have dropped Python 2.5 long ago and only do Python 2.6
and 2.7 these days.

Hanno
___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


Re: [Zope-dev] Change in webmaster position

2011-10-24 Thread Simon Michael
Thanks for all the hard work Michael!

Best,
-Simon

___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


[Zope-dev] new wiki.zope.org editor login

2011-10-24 Thread Simon Michael
Hey all.. the shared login for wiki.zope.org editing has been discovered by a 
spammer, so I've changed the password. The 
login is now zope, edit0r. See the message below for more context.

Best,
-Simon



In 2011/05 I wrote:
  Dear all,
 
  edit spam across the wiki.zope.org wikis, gradually increasing over
  the years, has reached multiple incidents per day, multiple days per
  month. Current cleanup procedures take too much time (and are not 100%
  thorough - spam remains in history) and I don't want to spend time
  developing cleverer defenses. Therefore, from today making changes on
  any of the wiki.zope.org wikis requires authentication (a zwiki
  username cookie is no longer enough.)
 
  This marks the transition of our wikis from those early, lowest-
  possible-barrier-to-entry wiki days, to the modern era of mandatory
  access control. :-/
 
  Since there is no member management software in place to allow you to
  self-register, to get a login you'll need to either
 
  - - ask an admin to make one for you. The current wiki.zope.org admin
  users are: Simon Michael, Andreas Jung, Baiju Muthukadan, Sascha
  Welter, Michael Haubenwallner, Fred Drake, Jim Fulton, Ken Manheimer,
  Kevin Teague.
 
  - - use this generic login: zope, zope. The downside of using this a lot
  is that edit history will become less useful.
 
  Also, on wikis using the default skin (all but the zope3 wiki), to
  trigger a login prompt you'll need to manually visit some restricted
  url. Eg append /editform to any page, like so:
  http://wiki.zope.org/zope2/Zope2Wiki/editform
 
  I hope this will stop the spam, and not inconvenience editors too
  much. Please let me know if you have authenticated and still can't edit.
 
  If you are interested in improving this setup, doing any other
  maintenance of the zope wikis, or taking over as zope wiki czar -
  please step forward! I'd be happy to mentor and provide all needed
  support.
 
  Best,
  - -Simon

___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


[Zope-dev] Hotfix for security vulnerability

2011-10-24 Thread Tres Seaver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On behalf of the Zope security response team, I would like to announce
the availability of a hotfix for a vulnerability inadvertently
published earlier today.

'Products.Zope_Hotfix_20111024' README
==

Overview
- 

This hotfix addresses a serious vulnerability in the Zope2
application server.  Affected versions of Zope2 include:

- - 2.12.x = 2.12.20

- - 2.13.x = 2.13.6

Older releases (2.11.x, 2.10.x, etc.) are not vulnerable.

The Zope2 security response team recommends that all users of
these releases upgrade to an unaffected release (2.12.21 or
2.13.11) as soon as they become available.

Until that upgrade is feasible, deploying this hotfix also
mitigates the vulnerability.


Installing the Hotfix:  Via 'easy_install'
- ---

If the Python which runs your Zope instance has 'setuptools'
installed (or is a 'virtualenv'), you can install the hotfix
directly from PyPI::

  $ /prefix/bin/easy_install Products.Zope_Hotfix_20111024

and then restart the Zope instance, e.g.:

  $ /path/to/instance/bin/zopectl restart


Installing the Hotfix:  Via 'zc.buildout'
- -

If your Zope instance is managed via 'zc.buildout', you can
install the hotfix directly from PyPI.  Edit the 'buildout.cfg'
file, adding Products.Zope_Hotfix_20111024 to the eggs
section of the instance.  E.g.::

  [instance] recipe = plone.recipe.zope2instance #...  eggs =
  ${buildout:eggs} Products.Zope_Hotfix_20111024

Next, re-run the buildout::

  $ /path/to/buildout/bin/buildout

and then restart the Zope instance, e.g.:

  $ /path/to/buildout/bin/instance restart


Installing the Hotfix:  Manual Installation
- ---

You may also install this hotfix manually.  Download the tarball from
the PyPI page:

 http://pypi.python.org/pypi/Products.Zope_Hotfix_20111024

Unpack the tarball and add a 'products' key to the 'etc/zope.conf' of
your instance.  E.g.::

  products /path/to/Products.Zope_Hotfix_20111024/Products

and restart.


Verifying the Installation
- --

After restarting the Zope instance, check the
'Control_Panel/Products' folder in the Zope Management Interface,
e.g.:

  http://localhost:8080/Control_Panel/Products/manage_main

You should see the 'Zope_Hotfix_20111024' product folder there.



Tres.
- -- 
===
Tres Seaver  +1 540-429-0999  tsea...@palladion.com
Palladion Software   Excellence by Designhttp://palladion.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6l3pQACgkQ+gerLs4ltQ66AgCfT1cd94LXzBtdzNiBqKXnGBIF
7dwAoISO0AkuvERn+cw4W0cPo82c5r+D
=xRBY
-END PGP SIGNATURE-
___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


[Zope-dev] zope-tests - FAILED: 11, OK: 40

2011-10-24 Thread Zope tests summarizer
This is the summary for test reports received on the 
zope-tests list between 2011-10-23 00:00:00 UTC and 2011-10-24 00:00:00 UTC:

See the footnotes for test reports of unsuccessful builds.

An up-to date view of the builders is also available in our 
buildbot documentation: 
http://docs.zope.org/zopetoolkit/process/buildbots.html#the-nightly-builds

Reports received


   Bluebream / Python2.5.5 64bit linux
   Bluebream / Python2.6.5 64bit linux
   Bluebream / Python2.7.2 64bit linux
   ZTK 1.0 / Python2.4.6 Linux 64bit
[1]ZTK 1.0 / Python2.5.5 Linux 64bit
[2]ZTK 1.0 / Python2.6.5 Linux 64bit
   ZTK 1.0dev / Python2.4.6 Linux 64bit
   ZTK 1.0dev / Python2.5.5 Linux 64bit
   ZTK 1.0dev / Python2.6.5 Linux 64bit
[3]ZTK 1.1 / Python2.5.5 Linux 64bit
[4]ZTK 1.1 / Python2.6.5 Linux 64bit
   ZTK 1.1 / Python2.7.2 Linux 64bit
   ZTK 1.1dev / Python2.5.5 Linux 64bit
[5]ZTK 1.1dev / Python2.6.5 Linux 64bit
[6]ZTK 1.1dev / Python2.7.2 Linux 64bit
   Zope 3.4 KGS / Python2.4.6 64bit linux
   Zope 3.4 KGS / Python2.5.5 64bit linux
   Zope 3.4 Known Good Set / py2.4-32bit-linux
   Zope 3.4 Known Good Set / py2.4-64bit-linux
   Zope 3.4 Known Good Set / py2.5-32bit-linux
   Zope 3.4 Known Good Set / py2.5-64bit-linux
   Zope-2.10 Python-2.4.6 : Linux
   Zope-2.11 Python-2.4.6 : Linux
   Zope-2.12 Python-2.6.6 : Linux
   Zope-2.12-alltests Python-2.6.6 : Linux
   Zope-2.13 Python-2.6.6 : Linux
   Zope-2.13-alltests Python-2.6.6 : Linux
   Zope-trunk Python-2.6.6 : Linux
   Zope-trunk-alltests Python-2.6.6 : Linux
   winbot / ZODB_dev py_254_win32
   winbot / ZODB_dev py_265_win32
   winbot / ZODB_dev py_265_win64
   winbot / ZODB_dev py_270_win32
   winbot / ZODB_dev py_270_win64
[7]winbot / z3c.form_py_265_32
[8]winbot / zope.app.error_py_265_32
[9]winbot / zope.app.principalannotation_py_265_32
[10]   winbot / zope.generations_py_265_32
   winbot / ztk_10 py_254_win32
   winbot / ztk_10 py_265_win32
   winbot / ztk_10 py_265_win64
   winbot / ztk_11 py_254_win32
   winbot / ztk_11 py_265_win32
   winbot / ztk_11 py_265_win64
   winbot / ztk_11 py_270_win32
   winbot / ztk_11 py_270_win64
[11]   winbot / ztk_dev py_254_win32
   winbot / ztk_dev py_265_win32
   winbot / ztk_dev py_265_win64
   winbot / ztk_dev py_270_win32
   winbot / ztk_dev py_270_win64

Non-OK results
--

[1]FAILED  ZTK 1.0 / Python2.5.5 Linux 64bit
   https://mail.zope.org/pipermail/zope-tests/2011-October/051640.html


[2]FAILED  ZTK 1.0 / Python2.6.5 Linux 64bit
   https://mail.zope.org/pipermail/zope-tests/2011-October/051639.html


[3]FAILED  ZTK 1.1 / Python2.5.5 Linux 64bit
   https://mail.zope.org/pipermail/zope-tests/2011-October/051637.html


[4]FAILED  ZTK 1.1 / Python2.6.5 Linux 64bit
   https://mail.zope.org/pipermail/zope-tests/2011-October/051636.html


[5]FAILED  ZTK 1.1dev / Python2.6.5 Linux 64bit
   https://mail.zope.org/pipermail/zope-tests/2011-October/051651.html


[6]FAILED  ZTK 1.1dev / Python2.7.2 Linux 64bit
   https://mail.zope.org/pipermail/zope-tests/2011-October/051649.html


[7]FAILED  winbot / z3c.form_py_265_32
   https://mail.zope.org/pipermail/zope-tests/2011-October/051654.html


[8]FAILED  winbot / zope.app.error_py_265_32
   https://mail.zope.org/pipermail/zope-tests/2011-October/051658.html


[9]FAILED  winbot / zope.app.principalannotation_py_265_32
   https://mail.zope.org/pipermail/zope-tests/2011-October/051653.html


[10]   FAILED  winbot / zope.generations_py_265_32
   https://mail.zope.org/pipermail/zope-tests/2011-October/051659.html


[11]   FAILED  winbot / ztk_dev py_254_win32
   https://mail.zope.org/pipermail/zope-tests/2011-October/051671.html


___
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )


[Zope] serious security hole in manage users / Manage users permissions?

2011-10-24 Thread Niels Dettenbach
Dear Zope 2.12/.13 (4.0) devels,


as far as i can see i may have found a serious security hole within Zope 2.12 
/ 2.13 (4.0 not tested yet) - I'm still investigate here further...


problem:
==
Even on fresh Installs of Zope and fresh created instances on it anonymous / 
remote users able to access acl_users/manage_users by the web WITHOUT 
AUTHENTICATION. They can edit / delete / create users and serving roles as 
they want. Other management screens (as manage_main or manage_access aso. are 
protected as usual).

In manage_access Manage user is only allowed for Manager (as by default).

I don't believe that is any new behaviour of newer Zope versions...

I've tested this with (last public) 2.13.10 and last 2.12.20 with python2.6.

If any of the devels want to have a test url pls contact me directly.

Fresh installed zope instances was configured with defaults configs, except 
setting user zope (and/or port-base). Tried it with now owner or the admin 
user as owner of the acl_users too.

Can anyone prove this here too? If so, any solution / security fix?


many thanks,
best regards.


Niels.

-- 
---
Niels Dettenbach
Syndicat ITInternet
http://www.syndicat.com/

signature.asc
Description: This is a digitally signed message part.
___
Zope maillist  -  Zope@zope.org
https://mail.zope.org/mailman/listinfo/zope
**   No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope-dev )


Re: [Zope] serious security hole in manage users / Manage users permissions?

2011-10-24 Thread Laurence Rowe
Potential security issues should not be discussed on public mailing
lists but submitted to security-respo...@zope.org. Please submit the
full information to that address and do not follow up further on this
list.

Laurence

On 24 October 2011 15:05, Niels Dettenbach n...@syndicat.com wrote:
 Dear Zope 2.12/.13 (4.0) devels,


 as far as i can see i may have found a serious security hole within Zope 2.12
 / 2.13 (4.0 not tested yet) - I'm still investigate here further...


 problem:
 ==
 Even on fresh Installs of Zope and fresh created instances on it anonymous /
 remote users able to access acl_users/manage_users by the web WITHOUT
 AUTHENTICATION. They can edit / delete / create users and serving roles as
 they want. Other management screens (as manage_main or manage_access aso. are
 protected as usual).

 In manage_access Manage user is only allowed for Manager (as by default).

 I don't believe that is any new behaviour of newer Zope versions...

 I've tested this with (last public) 2.13.10 and last 2.12.20 with python2.6.

 If any of the devels want to have a test url pls contact me directly.

 Fresh installed zope instances was configured with defaults configs, except
 setting user zope (and/or port-base). Tried it with now owner or the admin
 user as owner of the acl_users too.

 Can anyone prove this here too? If so, any solution / security fix?


 many thanks,
 best regards.


 Niels.

 --
 ---
 Niels Dettenbach
 Syndicat ITInternet
 http://www.syndicat.com/
 ___
 Zope maillist  -  Zope@zope.org
 https://mail.zope.org/mailman/listinfo/zope
 **   No cross posts or HTML encoding!  **
 (Related lists -
  https://mail.zope.org/mailman/listinfo/zope-announce
  https://mail.zope.org/mailman/listinfo/zope-dev )


___
Zope maillist  -  Zope@zope.org
https://mail.zope.org/mailman/listinfo/zope
**   No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope-dev )


Re: [Zope] serious security hole in manage users / Manage userspermissions?

2011-10-24 Thread Jaroslav Lukesh
2.10.13 is not affected in direct link nor acquired link.
___
Zope maillist  -  Zope@zope.org
https://mail.zope.org/mailman/listinfo/zope
**   No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope-dev )


[Zope] Manipulating images in Zope/Python

2011-10-24 Thread Brian Sullivan
I am looking for strategy to programmatically create a customized
printable certificate of completion for our Learning Delivery System
courses (the system is Zope/Python based).

My current plan is to use the Python Imaging Library to create the
image (probably by overlaying some text on a stock image of a
completion certificate to create a new image). The final image will
then be emailed as an attachment to users.

Is this a reasonable approach? Any others that anybody can suggest?
Any samples of doing anything like this that anyone can point to?
___
Zope maillist  -  Zope@zope.org
https://mail.zope.org/mailman/listinfo/zope
**   No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope-dev )


[Zope] Hotfix for security vulnerability

2011-10-24 Thread Tres Seaver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On behalf of the Zope security response team, I would like to announce
the availability of a hotfix for a vulnerability inadvertently
published earlier today.

'Products.Zope_Hotfix_20111024' README
==

Overview
- 

This hotfix addresses a serious vulnerability in the Zope2
application server.  Affected versions of Zope2 include:

- - 2.12.x = 2.12.20

- - 2.13.x = 2.13.6

Older releases (2.11.x, 2.10.x, etc.) are not vulnerable.

The Zope2 security response team recommends that all users of
these releases upgrade to an unaffected release (2.12.21 or
2.13.11) as soon as they become available.

Until that upgrade is feasible, deploying this hotfix also
mitigates the vulnerability.


Installing the Hotfix:  Via 'easy_install'
- ---

If the Python which runs your Zope instance has 'setuptools'
installed (or is a 'virtualenv'), you can install the hotfix
directly from PyPI::

  $ /prefix/bin/easy_install Products.Zope_Hotfix_20111024

and then restart the Zope instance, e.g.:

  $ /path/to/instance/bin/zopectl restart


Installing the Hotfix:  Via 'zc.buildout'
- -

If your Zope instance is managed via 'zc.buildout', you can
install the hotfix directly from PyPI.  Edit the 'buildout.cfg'
file, adding Products.Zope_Hotfix_20111024 to the eggs
section of the instance.  E.g.::

  [instance] recipe = plone.recipe.zope2instance #...  eggs =
  ${buildout:eggs} Products.Zope_Hotfix_20111024

Next, re-run the buildout::

  $ /path/to/buildout/bin/buildout

and then restart the Zope instance, e.g.:

  $ /path/to/buildout/bin/instance restart


Installing the Hotfix:  Manual Installation
- ---

You may also install this hotfix manually.  Download the tarball from
the PyPI page:

 http://pypi.python.org/pypi/Products.Zope_Hotfix_20111024

Unpack the tarball and add a 'products' key to the 'etc/zope.conf' of
your instance.  E.g.::

  products /path/to/Products.Zope_Hotfix_20111024/Products

and restart.


Verifying the Installation
- --

After restarting the Zope instance, check the
'Control_Panel/Products' folder in the Zope Management Interface,
e.g.:

  http://localhost:8080/Control_Panel/Products/manage_main

You should see the 'Zope_Hotfix_20111024' product folder there.



Tres.
- -- 
===
Tres Seaver  +1 540-429-0999  tsea...@palladion.com
Palladion Software   Excellence by Designhttp://palladion.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6l3pQACgkQ+gerLs4ltQ66AgCfT1cd94LXzBtdzNiBqKXnGBIF
7dwAoISO0AkuvERn+cw4W0cPo82c5r+D
=xRBY
-END PGP SIGNATURE-
___
Zope maillist  -  Zope@zope.org
https://mail.zope.org/mailman/listinfo/zope
**   No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope-dev )


[Zope-CMF] cmf-tests - OK: 4

2011-10-24 Thread CMF tests summarizer
This is the summary for test reports received on the 
cmf-tests list between 2011-10-23 00:00:00 UTC and 2011-10-24 00:00:00 UTC:

See the footnotes for test reports of unsuccessful builds.

An up-to date view of the builders is also available in our 
buildbot documentation: 
http://docs.zope.org/zopetoolkit/process/buildbots.html#the-nightly-builds

Reports received


   CMF-2.2 Zope-2.12 Python-2.6.6 : Linux
   CMF-2.2 Zope-2.13 Python-2.6.6 : Linux
   CMF-trunk Zope-2.13 Python-2.6.6 : Linux
   CMF-trunk Zope-trunk Python-2.6.6 : Linux

Non-OK results
--

___
Zope-CMF maillist  -  Zope-CMF@zope.org
https://mail.zope.org/mailman/listinfo/zope-cmf

See https://bugs.launchpad.net/zope-cmf/ for bug reports and feature requests