[wp-hackers] Security at Wordpress

Elliotte Harold elharo at metalab.unc.edu
Mon Apr 24 15:00:09 GMT 2006


Doug Stewart wrote:

> No, it isn't a core principle, it's a beneficial side-effect.  Open
> Source development leverages network effects incurred by numerous
> developers having access to the underlying code.  As is the case in most
> well-designed network topologies, barriers (in this case, unresponsive
> devs unwilling to commit code volunteered by others) are circumvented
> and routed around, usually through forks.  I would argue that this is a
> non-ideal solution in most cases (the ideal being that everyone
> contributes to the same codebase, making it stronger in the aggregate).
> 

That ideal assumes people want the same thing. Sometimes different 
groups have different needs, and require different products to satisfy 
those needs. One system cannot be everything to every one. NetBSD, 
FreeBSD, and OpenBSD are good examples. They are different projects with 
different motivations and criteria. If you want portability pick NetBSD. 
  If you want security pick OpenBSD. If you want performance on X86, 
pick FreeBSD. Three different products forked form the same code base 
because different people have different needs and criteria for choosing 
an OS.


> This selfishly (on your part) forces the devs to keep track of your
> fork, as well as every other WP-related fork out there.  You've turned
> core WP development into an ineffecient "pull" model instead of the
> preferred "push" one.  The fact of the matter is that you claim to have
> coded around the very subject of this extremely long thread, thus you
> MUST have code that accomplishes such.  Go to Trac, submit a .diff
> attached to a ticket and then let the chips fall where they may.  To
> huffily reply that it's the duty of the WP devs to come looking for your
> code is the height of arrogance, once again IMNSHO.

Point of order: I've claimed no such thing. I have described a 
reasonable prophylatic measure that can be taken within the current code 
base to protect yourself from the two attacks discovered so far. Simply:

1. Don't allow img elements in comments
2. Don't give 3rd parties contributor rights
3. Don't follow 3rd party links from the comment moderation page.

So far, none of this requires a patch; but this is all a kludge we'd 
rather not have to take. It should be possible to give third parties 
contributor rights. It should be safe to follow 3rd party links from the 
admin pages. Making this safe requires changing the code.

The core team seems to want to implement a complex nonce based solution. 
I suspect there's a simpler, more robust solution using POST instead of 
GET. Whether I write the code to implement that solution depends on a 
variety of factors. However when the core team has been quite clear that 
they do not intend to accept a POST solution no matter what, then 
patches are not an option. There's no point in wasting my time and 
theirs cluttering TRAC with patches they've already said they'll reject. 
If they change their minds, I'll submit what I write; but given the 
current situation, the question is not patch or don't patch. The 
question is fork or do nothing.

-- 
Elliotte Rusty Harold  elharo at metalab.unc.edu
XML in a Nutshell 3rd Edition Just Published!
http://www.cafeconleche.org/books/xian3/
http://www.amazon.com/exec/obidos/ISBN=0596007647/cafeaulaitA/ref=nosim


More information about the wp-hackers mailing list