Re: svnmerge log policy?

2007-03-14 Thread Malcolm Tredinnick
On Thu, 2007-03-15 at 02:30 +, Uros Trebec wrote: > Hi everyone, > > I am the maintainer of "full-history" branch and I am currently trying > to bring it up to date. > > I am trying to merge current trunk to the branch and the only way to > do that successfully was to use "svnmerge" tool. >

Re: newsessions

2007-03-14 Thread Malcolm Tredinnick
On Wed, 2007-03-14 at 22:44 -0700, ak wrote: > Guys > The only thing I don't understand at the moment is: everyone > understands that current implementation of ORM together with current > implementation of sessions table doesn't allow to force insert and > throw exception if it fails. So I can sta

Re: newsessions

2007-03-14 Thread ak
Guys The only thing I don't understand at the moment is: everyone understands that current implementation of ORM together with current implementation of sessions table doesn't allow to force insert and throw exception if it fails. So I can state this as a special case. Every framework has limitati

Re: newsessions

2007-03-14 Thread Malcolm Tredinnick
On Thu, 2007-03-15 at 07:04 +0530, Arvind Singh wrote: [...] > What I don't understand is: Why the developers don't do the correct > thing by providing separate insert() and update() in addition to > save() ? All it requires is a trivial refactoring and actually > simplifies the code (also clarify

Re: newsessions

2007-03-14 Thread Benjamin Slavin
On 3/14/07, James Bennett <[EMAIL PROTECTED]> wrote: > 1. Manually seeding the RNG with a value unique to the server process, > or to the request, would move the probability of key collision closer > to what it "should" be, thus dramatically reducing the problem. Do we really need to re-seed the

Re: newsessions

2007-03-14 Thread Jon Colverson
Malcolm Tredinnick wrote: > It's a discussion worth having in a clam manner in another thread. Did anyone else picture mollusks having a conversation when they read that? ;-) -- Jon --~--~-~--~~~---~--~~ You received this message because you are subscribed to t

svnmerge log policy?

2007-03-14 Thread Uros Trebec
Hi everyone, I am the maintainer of "full-history" branch and I am currently trying to bring it up to date. I am trying to merge current trunk to the branch and the only way to do that successfully was to use "svnmerge" tool. Now, the merge apparently went well, without any conflicts, so I woul

Re: newsessions

2007-03-14 Thread Arvind Singh
> 1. Manually seeding the RNG with a value unique to the server process, > or to the request, would move the probability of key collision closer > to what it "should" be, thus dramatically reducing the problem. Problem is reduced... but still remains. > 2. Changing the session framework's behavi

Re: newsessions

2007-03-14 Thread James Bennett
On 3/14/07, Michael Radziej <[EMAIL PROTECTED]> wrote: > If you have multiple processes which initialize their random > module at exactly the same system time (how granular is it?, you'll get the > same seed and therefore the same sequence of pseudorandom numbers in > python2.3 > > In python2.4, t

Re: Tickets on send_mass_mail functionality (multipart/encoding/TLS/BCC)

2007-03-14 Thread Lachlan Cannon
Simon G. wrote: > #3307 - Add BCC to mail framework. > I've renamed this ticket from what it used to be. This originally had > two issues - one which overlapped with #1541, and the other this BCC > request. There's a patch here with adds a parameter to send_mass_mail > to suppress the recipi

Re: DateField and DateTimeField and auto_now, auto_now_add

2007-03-14 Thread Norjee
> On 14 mrt, 01:40, "Honza Kr=E1l" <[EMAIL PROTECTED]> wrote: > > for this use DateField( default=3Dmodels.LazyDate() ), it will do > exactly what you want: supply a default value of NOW() when no > timestamp is given. > > It seems redundant to replicate this with the auto_* stuff, those are > me

Re: newsessions

2007-03-14 Thread James Bennett
On 3/14/07, Benjamin Slavin <[EMAIL PROTECTED]> wrote: > 2) James has suggested that the answer is, perhaps, better seeding. I > really don't think that this is an issue. Regardless of the seed, > there is still a mathematical chance that a collision will occur. This is true, but given the rang

Re: newsessions

2007-03-14 Thread Ivan Sagalaev
ak wrote: > Ivan, although reseeding still not guarantees that there may be no > duplicates as INSERTing does, isn't it ? Yeah... I actually don't object to your approach at all, I'm just guessing why random numbers could become... uhm... not that random. --~--~-~--~~~--

Re: newsessions

2007-03-14 Thread Benjamin Slavin
Man, there's been a lot of movement in this thread. I'd like to just throw out a few comments. 1) The current session framework unquestionably needs some attention. The way in which sessions are being generated isn't terribly efficient, and can certainly lead to collisions. 2) James has sugge

Re: Server-side cursors in psycopg2

2007-03-14 Thread Paul Boddie
On 14 Mar, 08:51, Malcolm Tredinnick <[EMAIL PROTECTED]> wrote: > > I hadn't realised that existing cursors pulled everything over at once > -- I would have "guessed" (based on no information other than "that's > the way I would think of doing it") that they would pull a chunk of > results each ti

Re: newsessions

2007-03-14 Thread Michael Radziej
On Wed, Mar 14, Ivan Sagalaev wrote: > > Michael Radziej wrote: > > Beginning with python2.4, the seed also uses os.urandom() when available, so > > it starts to get safer. > > Uhm... But it still happens only once on first module import. So it's > not safer at all. If you have multiple proce

Re: DateField and DateTimeField and auto_now, auto_now_add

2007-03-14 Thread Norjee
> On 14 mrt, 01:40, "Honza Kr=E1l" <[EMAIL PROTECTED]> wrote: > > for this use DateField( default=3Dmodels.LazyDate() ), it will do > exactly what you want: supply a default value of NOW() when no > timestamp is given. > > It seems redundant to replicate this with the auto_* stuff, those are > mea

Re: DateField and DateTimeField and auto_now, auto_now_add

2007-03-14 Thread Norjee
> On 14 mrt, 01:40, "Honza Král" <[EMAIL PROTECTED]> wrote: > > for this use DateField( default=models.LazyDate() ), it will do > exactly what you want: supply a default value of NOW() when no > timestamp is given. > > It seems redundant to replicate this with the auto_* stuff, those are > meant

Re: newsessions

2007-03-14 Thread ak
Ivan, although reseeding still not guarantees that there may be no duplicates as INSERTing does, isn't it ? And insert needs to be done only once at session start and is performed ANYWAY at session start. The difference in my way is that insert is done when new session is created and in django's w

Re: newsessions

2007-03-14 Thread Ivan Sagalaev
Michael Radziej wrote: > Beginning with python2.4, the seed also uses os.urandom() when available, so > it starts to get safer. Uhm... But it still happens only once on first module import. So it's not safer at all. > I'm not sure whether it's a good idea to add periodic reseeding. Why not? I

Re: newsessions

2007-03-14 Thread ak
Henrique Ser, you lost the fact that we are using lighttpd, not apache, but our django works as preforked fastcgi. I can only say that i will NEVER use a potentially vulnerable session implementation where any not logged in user may get superuser's permission, even if a chance for this to happen a

Re: newsessions

2007-03-14 Thread ak
As I said, we restart our django fastcgi server a few times per a day. I think it is more related to: > Beginning with python2.4, the seed also uses os.urandom() when available, so > it starts to get safer. and our app runs under xen domU debian installation so may be there's something related

Re: newsessions

2007-03-14 Thread Henrique Ser
Hello all, I am quite new at django and I've been trying to get all the info I can by, amongst other means, reading through django-dev and django-users. I don't remember in which I read this but fastcgi, the way it is designed, doesn't work well with threads. The actual details escape me but I

Re: i18n: newforms - label and help_text don't work with _('')

2007-03-14 Thread Karsu
Ticket: http://code.djangoproject.com/ticket/3600 --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups "Django developers" group. To post to this group, send email to django-developers@googlegroups.com To unsubscribe fro

Re: newsessions

2007-03-14 Thread Afternoon
> 2. I have an ethernet connection @home and I sometimes log in to our > private web apps from home. Any 'c00l hacker' is able to scan network > traffic, get my session id and use it to join to my session too just > because there is absolutely no checking who uses session. We added ip > checking

Re: newsessions

2007-03-14 Thread Michael Radziej
On Wed, Mar 14, Ivan Sagalaev wrote: > I've just recalled a case... I was using Django's randomly generated > passwords and it worked fine under mod_python. Then I switched to > FastCGI and from some moment *all* passwords started being generated > absolutely equal. The thing was that mod_pyth

Re: newsessions

2007-03-14 Thread ak
Btw, we use Debian with python 2.4 too --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups "Django developers" group. To post to this group, send email to django-developers@googlegroups.com To unsubscribe from this grou

Re: newsessions

2007-03-14 Thread Ivan Sagalaev
Michael Radziej wrote: > But something else must go wrong in your case, as the chance to get the > same session ids should be so tiny that you really shouldn't reports > from your users. Comments say that the random number generator is > seeded when the server process starts, and it's seeded with

Re: newsessions

2007-03-14 Thread ak
Michael, I really don't know how would it be possible, I only know the following: 1. My production web server restarts a few times per day. Sometimes twice (in a really short period ie 2-3 minutes) 2. I got a report from _new_ user that he received e-mail with login and pass, clicked to link and b

Re: newsessions

2007-03-14 Thread Michael Radziej
Hi Anton, ak schrieb: >> so it doesn't get us any real improvement in security > > James, there is a concept of 'fool proof'. Real hackers may do many > things. But current model allows even 10 year old kids to be hackers. > This is just against them. There is no ability to protect all sites > w