Ian Holsman wrote:
> On 21/08/2006, at 9:24 PM, [EMAIL PROTECTED] wrote:
>
> You deny everything by default, and have holes added when you need them.
> and when you poke a hole you have a reference to why it is required
> (ie what module needs a particular variable unfiltered)
>
> Things which you don't know will hurt you unfortunately.  and by
> using deny by default with a big sledgehammer will
> stop a lot of these things before they even touch your code.
>
> doing it the other way requires a conscious effort to maintain the
> firewall, and you won't know when you are failing.
>

Hmm, didn't see the reply to this until now.

Anyway - yes, you're right. But I think there is a tendency to go
overboard with things like mod_security. For example, you can download
huge lists of mod_sec rules at places like gotroot.com, which have some
very broad spectrum anti SQL-injection, XSS etc rules e.g. last I
looked at them there was a rule to deny all POSTs with various SQL
keywords ( select, insert, drop, etc ). The chances of false positives
are very high with things like this.

I guess my major issue here is that the webserver should not be
protecting crappy applications from themselves. Mod_security and
similar should not be relied on. The application needs to do the
relevant security.

--Simon


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django developers" group.
To post to this group, send email to django-developers@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-developers
-~----------~----~----~----~------~----~------~--~---

Reply via email to