I tried making it more clear in the documentation: 
https://github.com/TurboGears/tg2docs/pull/19

Am Samstag, 26. Januar 2013 11:21:37 UTC+1 schrieb Alessandro Molina:
>
> beaker.session.type = file was the default a few releases ago for that 
> same reason.
> It has been changed due to people complaining that they were finishing 
> file system inodes due to beaker sessions as they didn't provide a script 
> to clean up sessions.
> The solution applied has been to change the default to cookie and let the 
> developer choose his own way to manage sessions on the server.
>
> We can probably add a warning to both cookie and file sessions making the 
> user aware of the limits of both, but I would keep the default on cookie as 
> it seems to satisfy more users as a default.
>
>
> On Fri, Jan 25, 2013 at 11:48 PM, Moritz Schlarb 
> <[email protected]<javascript:>
> > wrote:
>
>> Hi there,
>>
>> beaker.session is (like most session frameworks) vulnerable to a
>> "malicious pickle" attack (if the attacker knows the secret key) when
>> cookies are used (which can lead to remote code execution).
>> Now, of course, the secret key is - as its name says - meant to be kept
>> secret and to be changed for every deployment, and the vulnerabilities
>> in the pickle protocol are also mentioned in the Python docs.
>> So, "normal" applications should be safe - as long as there is no
>> possibility for arbitrary file access.
>> Though, brute-force decrypting the cookie, looking for something that
>> looks like pickle'd data could be possible.
>>
>> But, as an easy solution is to just use beaker.session.type = file
>> instead of cookie, I think it could be worth either discussing changing
>> the default or at least mentioning this explicitly in a red box in the
>> documentation. ;)
>> - Especially since it also applies to apps that do not actively use
>> tg.session - since the session gets depickled anyways (and it such
>> cases, a developer might think that he doesn't need to care about the
>> secret key at all!).
>>
>> The vulnerabilities are described here:
>> http://vudang.com/2013/01/python-web-framework-from-lfr-to-rce/ and a
>> PoC for an exploit, that can be used is available here:
>> https://github.com/danghvu/pwp
>>
>> Regards,
>> Moritz
>>
>> --
>> Moritz Schlarb
>>
>> --
>> You received this message because you are subscribed to the Google Groups 
>> "TurboGears" group.
>> To post to this group, send email to [email protected]<javascript:>
>> .
>> To unsubscribe from this group, send email to 
>> [email protected] <javascript:>.
>> Visit this group at http://groups.google.com/group/turbogears?hl=en.
>> For more options, visit https://groups.google.com/groups/opt_out.
>>
>>
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"TurboGears" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
Visit this group at http://groups.google.com/group/turbogears?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to