Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 62F4A200B9E for ; Sat, 8 Oct 2016 14:35:29 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 61620160ADF; Sat, 8 Oct 2016 12:35:29 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 760B6160AD1 for ; Sat, 8 Oct 2016 14:35:28 +0200 (CEST) Received: (qmail 94082 invoked by uid 500); 8 Oct 2016 12:35:22 -0000 Mailing-List: contact dev-help@river.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@river.apache.org Delivered-To: mailing list dev@river.apache.org Received: (qmail 94042 invoked by uid 99); 8 Oct 2016 12:35:18 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd4-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 08 Oct 2016 12:35:18 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd4-us-west.apache.org (ASF Mail Server at spamd4-us-west.apache.org) with ESMTP id 23AE6C12C9 for ; Sat, 8 Oct 2016 12:35:18 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd4-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.1 X-Spam-Level: X-Spam-Status: No, score=-0.1 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=disabled Authentication-Results: spamd4-us-west.apache.org (amavisd-new); dkim=pass (1024-bit key) header.d=zeus.net.au Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd4-us-west.apache.org [10.40.0.11]) (amavisd-new, port 10024) with ESMTP id DfRVAfRl6SXQ for ; Sat, 8 Oct 2016 12:35:15 +0000 (UTC) Received: from webcloud66.au.syrahost.com (server-3m-r60.ipv4.au.syrahost.com [163.47.72.130]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTPS id 8896B5F243 for ; Sat, 8 Oct 2016 12:35:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=zeus.net.au ; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References: Subject:To:MIME-Version:From:Date:Message-ID:Sender:Reply-To:Cc:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=wlRztwRxo4Eoniad2jx7cP6t5N6UFtoMB3/dBYc3GeY=; b=wEgEg9hpPwS29oRM48MwqIlnVs H5OAiY5wcVbMh7WhFfg8czQE99/0WmfrD65vlP7Wg7j/+vE0cMkKPK+NUMoDcLLQ3glMvFRmn1rr4 pIySVEDNsHdh+rpI+krLy/J997tt90fHGGnD0YShcxXWUhVSwDk8pk21tEdSkKuK3mzI=; Received: from pa49-197-12-2.pa.qld.optusnet.com.au ([49.197.12.2]:26717 helo=[192.168.43.70]) by webcloud66.au.syrahost.com with esmtpsa (TLSv1:ECDHE-RSA-AES256-SHA:256) (Exim 4.87) (envelope-from ) id 1bsqqF-003vlL-Bz for dev@river.apache.org; Sat, 08 Oct 2016 20:35:03 +0800 Message-ID: <57F8E7FE.1040207@zeus.net.au> Date: Sat, 08 Oct 2016 22:35:10 +1000 From: Peter User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.28) Gecko/20120306 Thunderbird/3.1.20 MIME-Version: 1.0 To: dev@river.apache.org Subject: Re: Future of River References: <077a640e8c46a426892bb5e06cc160fa@org.tizen.email> <0d9a1a8b-ad30-0b29-e919-291b59868adf@acm.org> In-Reply-To: <0d9a1a8b-ad30-0b29-e919-291b59868adf@acm.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - webcloud66.au.syrahost.com X-AntiAbuse: Original Domain - river.apache.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - zeus.net.au X-Get-Message-Sender-Via: webcloud66.au.syrahost.com: authenticated_id: jini@zeus.net.au X-Authenticated-Sender: webcloud66.au.syrahost.com: jini@zeus.net.au X-Source: X-Source-Args: X-Source-Dir: archived-at: Sat, 08 Oct 2016 12:35:29 -0000 Thanks Patricia. It would be nice if we could hear a little about what people want for River going forward. Regards, Peter. On 7/10/2016 5:08 PM, Patricia Shanahan wrote: > This message is to change the subject line. These comments are far too > important to be mistaken for being part of wrapping up the 3.0 release. > > On 10/6/2016 10:57 PM, Peter wrote: >> To answer my own question, a list of items that require attention: >> 1. Modular build. >> 2. Improved IPv6 support >> 3. Update to TLS v1.2 and update constraints. >> 4. Investigate Maven codebase provisioning, do we need to use the >> Maven ClassWorlds ClassLoaders, what about proxy identity? >> 5. Fix security. >> 6. Update website. >> 7. Development guide for River devs. >> 8. Redundancy? >> 9. Update user docs, perhaps update Jan Newmarch's book? >> >> Cheers, >> >> Peter. >> >> >> >> >> Sent from my Samsung device. >> >> Include original message >> ---- Original message ---- >> From: Peter >> Sent: 07/10/2016 12:25:01 pm >> To: dev@river.apache.org >> Subject: Re: [VOTE] Release Apache River 3.0.0 >> >> The question is of course where to next? >> >> As people are aware I've been working on addressing security issues and >> how to make River better and more secure. I've been working on this >> outside the project because my attempts to discuss it caused heated >> arguments. I figured that if I could demonstrate a working example that >> people could try out, it could allevieate any misunderstandings that may >> have developed due to language or culture differences. >> >> River's approach to security (a result of the Jini Davis project) is >> quite complex and contains a flaw borne out of two limitations around >> the time it was developed: >> >> 1. The assumption that the Java sandbox and java serialization was >> secure (we know today this isn't the case). >> 2. Interfaces cannot be changed (no longer true with java 8), in this >> case ServiceRegistrar was designed prior to the later added on >> security features. >> >> What's wrong with River's approach? >> >> Answer: It validates and authenticates after downloading code and >> deserializing untrusted data, using the proxy trust framework, by asking >> an already downloaded and deserialized service proxy for a bootstrap >> proxy, the client code then uses the boostrap proxy to determine if the >> service proxy can be trusted. Too little too late. Why not instead >> recieve a bootstrap proxy, deserialized using input validation, without >> code download, authenticate the remote endpoint, then ask the bootstrap >> proxy for the service proxy? >> >> The trouble with the existing approach today is an attacker has >> opportunity to take control of a computer using deserialization alone. >> For those who think a network firewall is sufficient protection and the >> flawed security design isn't an issue on local networks, even in air >> gapped networks, an attacker can leave a USB key in a car park >> containing malware that looks for network transmissions that contain >> java serialized data, hoping that someone will pick it up and plug it >> into their pc, the malware will send serial data containing a gadget >> attack to a listening network port that accepts java serial data and >> take over the infected computer. >> >> All network communications using standard java serialization must be >> both authenticated and encrypted, prior to reading in any data to ensure >> that the data is trusted. >> >> I think we can all accept that these vulnerabilities exist and googling >> java serialization gadget attacks should convince even the most doubtful >> sceptic. >> >> Relevant links: >> https://www.apache.org/dev/committers.html#apache-way >> http://www.apache.org/security/committers.html >> >> I would like the opportunity to explain more, and go through working >> examples of solutions before we start arguing about whether we should >> solve these problems. Anyone reading the Apache Way will realise that >> security is a mandatory feature of Apache Software and therefore we >> should consider how we should fix existing security issues in River and >> while doing so, take the opportunity to make security simpler to >> implement. Arguments should not be about the relevance of security >> issues, but rather the suitablility of solutions. >> >> Regards, >> >> Peter. >> >> On 6/10/2016 2:04 PM, Bryan Thompson wrote: >>> Excellent. A great step. >>> Bryan >>> >>> On Wednesday, October 5, 2016, Peter >>> Firmstone >>> wrote: >>> >>>> Results: >>>> >>>> 3 binding votes >>>> 1 non binding >>>> >>>> None against. >>>> >>>> The artifacts have been published, we need to wait 24 hours before >>>> announcing. >>>> >>>> Regards, >>>> >>>> Peter. >>>> >>>> Sent from my Samsung device. >>>> >>>> >> >> >> >