Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Open Source Programming Security Social Networks IT

Security Lessons Learned From the Diaspora Launch 338

patio11 writes "Diaspora, the privacy-respecting OSS social network, did a code release last week. Attention immediately focused on security. In fact the code base included several severe security bugs. This post walks through the code, showing what went wrong, and what it would let an attacker do to someone who was using Diaspora." The developer who wrote the post ends with: "You might believe in the powers of OSS to gather experts (or at least folks who have shipped a Rails app, like myself) to Diaspora’s banner and ferret out all the issues. You might also believe in magic code-fixing fairies. Personally, I’d be praying for the fairies because if Diaspora is dependent on the OSS community their users are screwed."
This discussion has been archived. No new comments can be posted.

Security Lessons Learned From the Diaspora Launch

Comments Filter:
  • Security (Score:4, Informative)

    by Anonymous Coward on Thursday September 23, 2010 @10:45AM (#33676232)

    Because of course, obscurity is proper security.

    • Re: (Score:3, Insightful)

      Those words have meaning. Specific meaning, in fact. And they in no way apply to this topic.
      • I think the AC forgot the sarcasm tags

        • No, even with sarcasm the AC still has the meaning wrong. The phrase "Security through obscurity" doesn't refer to closed source code, and it doesn't refer to not disclosing known flaws. It refers, exclusively, to things like 'no one will ever go to www.example.com/admin so there's no need to require credentials on the admin page'. Or 'no one will ever try to randomly telnet into port 6424, we'll output all the debug stuff there'. Or 'no one will every to to call this unpublished function'.

          • I guess you are better at reading a mind then I am.
            This is why lawyers are so long winded, even the honest ones.
            Too few words, have too many meanings.
            Yours are more robust, and have more specific meanings.
            Only the AC knows what the true intention was. i.e., closed source vs "back doors"
            Yours reminds me of DVD Easter eggs.

          • "Security through hubris," which refers to the hawkers (selling security that ain't) of proprietary software and gawkers (buying security that ain't) with brand-pride. "Security through hubris," doesn't refer to closed source code, and it doesn't refer to not disclosing known flaws. It refers, exclusively, to things that AC may of been referring too, like 'no one will ever go be able to find the security flaws, no one will ever know about or use open-port 6424 for cracking, and/or no one will every know eno

    • I am curious to see if the OSS model will be able to bring something up to speed quickly that was unacceptable when unveiled.

      I have to say I expected a better review of the first product given the "more eyeballs" theory.
      • Re: (Score:2, Interesting)

        by Daengbo ( 523424 )

        I read TFA (I know ...) and comments and many of the issues mentioned are addressable within Rails generally so I don't think that saying the project has no chance is fair to either the developers or to the OSS devs the author besmirches. That said, I have never been very pro-Diaspora and didn't expect anything secure or even really working in the first release from that team: they're just a bunch of college kids with little experience on summer break, after all.

        I still think that extending XMPP is the way

      • Re:Security (Score:4, Interesting)

        by the_womble ( 580291 ) on Thursday September 23, 2010 @12:22PM (#33677542) Homepage Journal

        The OSS model has already proven better in this instance.

        If Diaspora had been closed source, we would not have known about the vulnerabilities until AFTER they had been exploited - very exploited on a large scale. Because the code is open, it has been reviewed and the flaws spotted while it is still in alpha.

        That said, I will still not use this. I am not a real developer and I would be unlikely to make some of the mistakes that these people are making.

        • Re: (Score:3, Insightful)

          by mark72005 ( 1233572 )
          If it were, say, a private company producing this product, wouldn't they have subjected it to the normal quality control processes in software companies, thrown dedicated testing resources at it, thrown their in-house security specialists at it, or perhaps hired outside security specialists? Both did I observe during my time at a software company.

          I'm not blasting the model, just asking the questions.

          A private enterprise with its product and profit to think about would have had to get it up to a minimum leve
        • Re: (Score:3, Insightful)

          by sabt-pestnu ( 967671 )

          Diaspora has the benefit of being Open Source, much anticipated, and security aware. Thus, some number of security flaws have been found.

          Diaspora is lucky in that regard. Bugs have lain dormant in even open source code for decades before being discovered. "Open Source" does not guarantee that bugs will become obvious. Open Source does not even guarantee that there will be people looking at the code, only that they CAN.

  • ...huh? (Score:4, Insightful)

    by Pojut ( 1027544 ) on Thursday September 23, 2010 @10:46AM (#33676244) Homepage

    Because if Diaspora is dependent on the OSS community their users are screwed.

    Isn't that a bit like saying "if getting this building completed is dependent on construction workers, we're screwed"? Why would you make such a disparaging remark about the very people that will be keeping this thing going?

    • Re:...huh? (Score:4, Informative)

      by hedwards ( 940851 ) on Thursday September 23, 2010 @10:48AM (#33676270)

      Isn't that a bit like saying "if getting this building completed is dependent on volunteer construction workers, we're screwed"?

      FTFY

      • Re:...huh? (Score:4, Interesting)

        by MozeeToby ( 1163751 ) on Thursday September 23, 2010 @11:02AM (#33676434)

        Yeah, volunteers have never [wikipedia.org] put up a building before.

        • Re:...huh? (Score:5, Informative)

          by jridley ( 9305 ) on Thursday September 23, 2010 @11:31AM (#33676848)

          I work HfH construction once in a while. They hire professionals to do the important bits and the large stuff; excavating, pouring the foundation, wiring, plumbing, and often the finish carpentry. If you happen to have someone relatively skilled there, they may assist the pros; I've helped with all; wiring, plumbing, finish carpentry. But you don't let someone who is enthusiastic but doesn't know what they're doing do finish carpentry, they'll probably just wind up wrecking a lot of material. And if you let them do plumbing in an area where code requires copper pipe, you'll probably wind up with a mess that will take a pro 3 times longer to fix than if he'd just done it himself to start with.

          I think the latter may be the case when it comes to this project. I really, really hope this project comes together, but as a programmer I fear that if they've built this thing from the ground up without a good basic understanding of web security, the thing may have to be gutted and rewritten to get to where it needs to be.

          Lots of people can write web apps. Heck, I pretty much write web apps all day long, but I write them for intranet use, they're not accessible to the internet at large. If my stuff had to be hardened against the kind of general attack Diaspora is going to have to endure, I'd have to learn a lot more than I know now.

        • Yeah, volunteers have never [wikipedia.org] put up a building before.

          Existence of a past event (volunteers for X) is not a guarantee for the occurrence another independent event (volunteers for Y where Y has no relation to X). You don't rely on work being done with resources you cannot reliable predict to count on.

      • Volunteer construction? Yeah, there's an app^h^h^h organization for that.
        http://www.habitat.org/ [habitat.org]

        • Re: (Score:2, Funny)

          by Anonymous Coward
          From what I heard, since they're not experts at cutting corners, they tend to actually put together sturdier constructions than the professionals.
    • by Goaway ( 82658 )

      No, it is like saying that you are screwed if you have to rely on bystanders to come in and fix the work your construction workers did.

      • Re: (Score:3, Insightful)

        by Java Pimp ( 98454 )

        Provided those bystanders are also construction workers.

    • Re:...huh? (Score:4, Informative)

      by bigrockpeltr ( 1752472 ) on Thursday September 23, 2010 @11:16AM (#33676634)
      The summary took the quote slightly out of context. what i understood from TFA is that they are screwed in terms of meeting their (one month?) deadline.

      The team is manifestly out of their depth with regards to web application security, and it is almost certainly impossible for them to gather the required expertise and still hit their timetable for public release in a month.
    • Because if Diaspora is dependent on the OSS community their users are screwed.

      Isn't that a bit like saying "if getting this building completed is dependent on construction workers, we're screwed"? Why would you make such a disparaging remark about the very people that will be keeping this thing going?

      Because the problems encountered seem to be fundamental and numerous and which would require a reliable and consistent work force to fix them fast enough to make the whole enterprise workable. That is, the task seems monumental. This is not the same as starting a OSS project from a solid, workable core, buggy as it may be, but workable for the intended goals.

      Since the goal of Diaspora (its entire reason of existence) was security and privacy, they really f* up. And the OSS contributors that are behind it

  • WTF? (Score:4, Insightful)

    by berryjw ( 1071694 ) on Thursday September 23, 2010 @10:49AM (#33676288)
    Um, and if closed-source project were to receive the same level of public scrutiny, the users would be any less screwed?
    • Re: (Score:2, Interesting)

      by Nick Fel ( 1320709 )
      I guess because closed source projects generally DON'T receive public scrutiny? Without taking any stance on the open/closed debate, that's an undeniable risk of open source (along with the associated benefit that somebody might spot it and fix it, naturally).
      • I guess because closed source projects generally DON'T receive public scrutiny?

        Ever read Bugtraq and Full Disclosure mailing lists?

    • Re:WTF? (Score:5, Informative)

      by gazbo ( 517111 ) on Thursday September 23, 2010 @11:27AM (#33676802)
      You've been taken in by Slashdot's trademark selective quoting. What was actually written was:

      The team is manifestly out of their depth with regards to web application security, and it is almost certainly impossible for them to gather the required expertise and still hit their timetable for public release in a month. You might believe in the powers of OSS to gather experts (or at least folks who have shipped a Rails app, like myself) to Diaspora's banner and ferret out all the issues. You might also believe in magic code-fixing fairies. Personally, I'd be praying for the fairies because if Diaspora is dependent on the OSS community their users are screwed.

      (my bold) So he's not actually saying anything bad at all about OSS; he's just saying that being OSS doesn't mean that they can magically gain experience (or experienced developers) and fix their entire codebase in a month. The notion that OSS development is to blame was purely down to Slashdot (or the submitter).

      • Re:WTF? (Score:5, Informative)

        by locallyunscene ( 1000523 ) on Thursday September 23, 2010 @12:02PM (#33677270)
        Goddammit kdawson. That's it, your articles are blocked. You're the f***ing New York Post of Slashdot. Whatever merit any article you post may have you manage to completely overpower it with sensationalist editorial bias.
    • I don't think hes saying anything about closed source here - I think hes saying that there is a difference between the oft touted open source community approach, and the Red Hat-style sponsored project with paid developers approach.
  • Axe job (Score:2, Informative)

    All the Diaspora hate coming from this PRE-ALPHA release of their source code seems so strangely out of place.
    I mean, nothing seems to point to me that this is shill garbage coming from facebook, but the conceptual idea of Diaspora is sound and the code was released for the precise reason of improving it, as it has done. Yet all I've heard is some disproportionate vitriol against the project. It doesn't make sense.
    And hell, the majority of the security issues found appear to be rather simple to fix. Jus
    • Re: (Score:2, Informative)

      by rjstanford ( 69735 )

      This would be true if (and only if) the whole point of Diaspora wasn't to improve the security of your data. Seriously, that's the only significant quoted feature. And they didn't get that part close to right before launching? C'mon...

      • Re: (Score:3, Insightful)

        What "launching"? They aren't launched, they just had a public pre-alpha to invite people to come take a look and provide feedback.

        If that *had* been a launch, you'd be right. I tested the pre-alpha, and I provided my feedback. Let's let them go fix it now and see if the beta is better.

      • Re: (Score:3, Informative)

        It's supposed to make your data less completely-controlled by a single mega corporation. Security will be an issue no matter who controls the data, what matters here though is the gatekeeper.
        • This is what I perceived as the point of the project too. I never expected this to be a hacker proof version of facebook, and that never seemed to me to be the PROBLEM with facebook.

          The problem with facebook is how THEY use your data WITHOUT cracking a single thing.
        • Re:Axe job (Score:5, Funny)

          by eln ( 21727 ) on Thursday September 23, 2010 @11:08AM (#33676520)
          Exactly. It does exactly what it's supposed to do: Instead of having a single mega-corp have complete control of your data, it does completely the opposite and lets everyone in the world have complete control of your data! It truly is the anti-Facebook.
      • I think his point was that pre-alpha-release != launch.

      • Re: (Score:2, Redundant)

        by jensend ( 71114 )

        Uh- they haven't launched, and aren't launching for a good while yet. They just prefer to develop their code in an open fashion rather than "cathedral style." Sure, they could have just developed it in private until they felt it was "close to right"- and have lost many of the benefits of being an open-source project by doing so. Developing it in the open should result in a better codebase developed in less time.

        • Re: (Score:2, Insightful)

          by Daengbo ( 523424 )

          I am really on their side (and the side of all attempts at open social networking like XMPP's OneSocialWeb and Status.Net's OStatus), but they could have developed in the open from the beginning, and with the press they got, they would have had input on these problems when the code was in its infancy. It seems to me that the D team isn't open enough -- it's riding the fence and getting itself killed for the effort of doing so.

      • Then start your own project. Because I see maybe one or two other projects trying to do what Diaspora is doing. Either help contribute and fix the code, start your own project, or stfu.

        We need to get people free from the monitoring of facebook and this is in my opinion the best shot. If not just for the hype and catchy name. Those you can't change, the code you can, and quite easily. And the FOSS community will help keep it in check. So this criticism to me makes zero sense.

        They tried, they aren't sec
    • Re:Axe job (Score:5, Insightful)

      by Capt'n Hector ( 650760 ) on Thursday September 23, 2010 @11:03AM (#33676450)
      It doesn't really matter that it's pre alpha, or whatever designation you want to give it. A platform touted as being a secure replacement for facebook ought to consist of secure code from day 1. Security needs to be built into the bones of the program, and If you read the article, you'd see that the errors made were pretty egregious. Fact is, any programmer worth his or her salt would not have started out with code like this with a plan to fix it later in future releases, they'd get it right from the very beginning. That they made these mistakes so early on speaks wonders about how inexperienced these programmers were (and hopefully are no longer now that they've learned their lesson). I'm still rooting for Diaspora but am a little disappointed by this.
    • Re:Axe job (Score:5, Insightful)

      by TheSunborn ( 68004 ) <mtilstedNO@SPAMgmail.com> on Thursday September 23, 2010 @11:05AM (#33676484)

      but the conceptual idea of Diaspora is sound

      That may be and nobody is arguing about the concept itself. But a concept with not of much use without any usefull implementation.

      And hell, the majority of the security issues found appear to be rather simple to fix.

      This is exactly why this is so bad. The mistakes are so big and so obvious for any developer with experience in web applications that the developers which worked on Diaspora can not be trusted to write secure code. They have clearly demonstrated that they have absolutely no knowledge of security. They did not just make a security hole due to some obscure implementation detail, they designed and implemented a framework with no security at all.

      And security is not something you can add after you write the code. Just ask Microsoft about that.

      The only solution I see is to get a new team which know how to write code, and then ask them to take over(Or rewrite) the application.

    • Re:Axe job (Score:5, Interesting)

      by idontgno ( 624372 ) on Thursday September 23, 2010 @11:09AM (#33676546) Journal

      You're overlooking a few points.

      TFA's author acknowledges that it's a pre-alpha preview release. In a sane world, that means no one should ever go on-line with this code. But this is not a sane world, and he very specifically addresses how this release should have been done:

      If you put a gun to my head and said "Our donations came from 6,000 people who want to see progress, give me something to show them", I would have released the code that they had with the registration pages elided, forcing people to only add new users via Rake tasks or the console. That preserves 100% of the ability of developers to work on the project, and for news outlets to take screenshots, without allowing technically unsophisticated people to successfully sign up to the Diaspora seed sites.

      In other words, defang the thing before you turn it loose on an unsuspecting community. If I can successfully develop an open-source backyard nuclear fission generator, and release the pre-alpha blueprints, I would be rightly criticized for the occasional containment failure and subsequent deaths or injuries.

      Also, the attitude of "meh, the security issues are trivially easy to fix" completely misses the point. If the known issues are trivially easy to fix, why weren't they trivially easy to avoid in the first place? Because, apparently, the core developers aren't sufficiently competent or committed to actual application and architectural security. So there's no reason for confidence that there won't be another batch of crippling security flaws with each new release.

      Yeah, a lot of the backlash is probably in response to the hype around Diaspora. But much of the danger is also because of the hype. If Diaspora were just another quiet little Sourceforge project, it might have the luxury of a slow and casual crawl towards reliable application security. But guess what, Diaspora is the current Open Source equivalent of Paris Hilton. Being this screwed up is not an option, when the project is under such scrutiny and subject to such high expectations.

      • Re:Axe job (Score:4, Insightful)

        by Darkness404 ( 1287218 ) on Thursday September 23, 2010 @11:24AM (#33676756)

        Because, apparently, the core developers aren't sufficiently competent or committed to actual application and architectural security.

        That is the entire point of having an open source project is that the developers don't have to be experts. Diaspora was developed not because some guys who were great at security decided one day to lunch an uber secure network, it was developed because people were tired of all the crap that FB had so they developed it. Now that the source code is out, security experts can audit the code and make improvements.

        The original developers of an OSS project are like the managers, yeah, they know a little bit about the technical aspects but the main thing they have is vision then people who use it work on it to improve it. Or do you think Linus is some great wizard of security back when he wrote the very first version of Linux?

        Just because the current main developers aren't that great of security doesn't mean security is compromised, actually its the opposite, they can get security advice from professionals and other people who are good at security.

        • That is the entire point of having an open source project is that the developers don't have to be experts.

          For matters of net-wide security, if you aren't an expert, you need to have an expert, BEFORE public visibility, if there's ANY risk the exploitable code can escape into production.

          Or do you think Linus is some great wizard of security back when he wrote the very first version of Linux?

          And how highly anticipated was the initial Linux release? What was the resulting threat surface? How much practica

      • Diaspora is the current Open Source equivalent of Paris Hilton... subject to such high expectations.

        Wait... what?

        Sorry. I agree with most of what you said, but I couldn't let that slide.

      • My attitude on them being easy to fix comes out of my belief in the community to hold them accountable. If the owners of the project really aren't sufficiently capable of creating secure code then I would expect them to acquiesce to those willing to contribute who are. And given the popularity I suspect there are many. That is why I am so lax about it and surprised about the vitriol.
    • by eldavojohn ( 898314 ) * <eldavojohn@gma[ ]com ['il.' in gap]> on Thursday September 23, 2010 @11:11AM (#33676576) Journal

      I mean, nothing seems to point to me that this is shill garbage coming from facebook, but the conceptual idea of Diaspora is sound and the code was released for the precise reason of improving it, as it has done ...

      Okay well, sometimes I look at code and I think "good start" and then sometimes I feel like Simon Cowell ... and ask them to start over. So to determine where I stand with the Diaspora code, allow me to quote the article:

      1.#In photos_controller.rb
      2.def destroy
      3. @album = Album.find_by_id params[:id] # BUG
      4. @album.destroy
      5. flash[:notice] = "Album #{@album.name} deleted."
      6. respond_with :location => albums_url
      7.end

      This basic pattern was repeated several times in Diaspora’s code base: security-sensitive actions on the server used the params hash to identify pieces of data they were to operate on, without checking that the logged in user was actually authorized to view or operate on that data. For example, if you were logged in to a Diaspora seed and knew the ID of any photo on the server, changing the URL of any destroy action from the ID of a photo you own to an ID of any other photo would let you delete that second photo. Rails makes exploits like this child’s play, since URLs to actions are trivially easy to guess and object IDs “leak” all over the place. Do not assume than an object ID is private.

      Okay, I taught myself how to use the rails framework and code Ruby. And one of the things I was amazed at was the Rails magic. Because of how powerful it can be (both good and bad). Yes, it helps you prototype but it's errors like these that make me pause and reconsider if the person coding Ruby on Rails really understands how the framework is attempting to assist them. Obviously if you allow any user to enter any ID of a record in their URL for any CRUD action ... you aren't really understanding what those routes are trying to do for you. And you're a danger to your users.

      While I could quickly remedy the above problem for the Diaspora team by improving the authentication and authorization code checks, it might be better to just start over. Now, I've devoted none of my time to the concept of liberating social network users and for that I thank the Diaspora team. This blog posting -- if true -- sure is a vote of no confidence for their capabilities of developing a realistic system. Can they improve? Certainly. But if you're making errors like that, you might be better off letting someone else take a stab at this. It's a harsh thing to say but you don't understand the tool you're using to prototype if you're even starting at this point.

      I wish them the best of luck and I hope the community reaches out to them. But I'm not interested in recoding everything. I'd sooner simply start my own project.

      • Ruby (Score:3, Insightful)

        by Lennie ( 16154 )

        My problem with their efforts is they used Ruby. Which might be really nice and all, but not that many people use it. Thus it is really hard to find people who understand it well enough to help them work on the code and or just check the code for bugs.

      • That snipped looks bad. But, if the model was implemented right*, it may be close to best practice.
        Rails allows you to overload functions. Ideally, Album#destroy would check if the current user is allowed to delete the object and either delete itself or ignore the request if the user isn't authorized to delete it. Implementing security checks at the model level has the great advantage of limiting all security-related functions to a single, easily audit-able, consistent code path. The snippet still lacks rep

    • Re:Axe job (Score:5, Insightful)

      by jlechem ( 613317 ) on Thursday September 23, 2010 @11:15AM (#33676614) Homepage Journal
      I would agree, but that code was some junior level bullshit. Granted I haven't been doing this for 20 years, but damn that was some horrible coding going on there. Especially when they tout it as some super great OSS alternative to facebook. It almost made me question how good of a choice Ruby on Rails was for the entire project.
    • by am 2k ( 217885 )

      If I would manage someone who produced code like this, that person would be fired on the spot. This is not only bad coding, it shows a severe disregard for any common security practices. The feel for what you should do and shouldn't do (like validating all input) just isn't there. A server-side programmer seeing that kind of code is supposed to intuitively have an awkward feeling in his bowels and be unable to sleep until the problem is fixed in any way, not actually writing up and releasing this thing into

    • Re: (Score:3, Interesting)

      by horza ( 87255 )

      Also completely confused by the weird feedback on Slashdot. Once the model has stabilised, an API will be fixed and loads of Diaspora clients and servers will come about written in all different languages. The current implementation is irrelevant, it will be trashed and rewritten at some point anyway.

      Phillip.

  • Not faeries... (Score:2, Informative)

    by bosef1 ( 208943 )

    Unfortunately, the existance of code-fixing faeries was disproven by Wirth in 1972. Code fixes are actually implemented by type of cobbler elf.

  • by Anonymous Coward on Thursday September 23, 2010 @10:56AM (#33676382)

    Here is a list of alternative open source Peer-to-peer social networking softwares [bitcoin.org]

    Note that The Appleseed Project has existed since 2004 and is the first.

  • Invalid Argument (Score:5, Insightful)

    by aBaldrich ( 1692238 ) on Thursday September 23, 2010 @10:57AM (#33676386)

    if Diaspora is dependent on the OSS community their users are screwed.

    If it wasn't for the OSS community, everybody would believe they've released a safe program. Thanks to OSS, we now know that installing it is not the best decision yet.
    I'd say the users would be screwed if diaspora was not open source. Linus Law once again.

    I was not surprised to find out that the author sells [bingocardcreator.com] proprietary software. I think that maybe, just maybe he's biased against FLOSS?

  • Volunteers (Score:5, Insightful)

    by Thyamine ( 531612 ) <thyamine.ofdragons@com> on Thursday September 23, 2010 @11:07AM (#33676512) Homepage Journal
    I think the point they are trying to make (and perhaps badly) is that anytime you have to rely on volunteers you have the potential to get bit in the ass. Any volunteer organization or group has this problem, it's not just open source. Churches, after school groups, the Elks, etc. When volunteers are the main way you expect to get support, you are at their whim. This week people are busy, so no one shows up, or the kids have a soccer game, or some new more exciting group has their interest so you lose a few people.

    I don't think the idea is that the open source community is going to screw people, but that the idea of expecting volunteers to always be plentiful and useful is a good way to cause yourself problems.
    • Re:Volunteers (Score:5, Insightful)

      by JaredOfEuropa ( 526365 ) on Thursday September 23, 2010 @11:34AM (#33676902) Journal

      ...the idea of expecting volunteers to always be plentiful and useful is a good way to cause yourself problems.

      Software projects in business suffer from the same problem, actually. Oh, programmers are plentiful as long as you have budget to spare, but not all professional programmers are created equal, peer reviews / code inspections are slipshod or even omitted, and testing is haphazard. In fact sometimes there's a conscious decision to take shortcuts in those areas because of pressure on the timeline.

      The potential to be bitten in the ass by substandard work that goes undetected is always there, in business as well as OSS projects.

  • BAD slashdot! (Score:5, Insightful)

    by airfoobar ( 1853132 ) on Thursday September 23, 2010 @11:14AM (#33676602)

    Someone wrote a blog post to point out some security issues that need fixing in the pre-Alpha version of Diaspora, and here you are using his words for pointless sensationalism that undermines the work of the Diaspora team and propagates the "Diaspora is shite" gossip that will most certainly haunt the project even after the code has hit Beta. Shameful.

    If you want to do something useful, then instead of repeating how doomed the project is, ask for people to join them (I think we have some capable individuals around here) and help out.

    And no, I'm not affiliated with Diaspora, I'm just annoyed by what this sort of news reporting.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      The issue is that the community gave them $200,000. Frankly I'm surprised that so many people trusted 4 college students with this task. But now their incompetence is showing. Don't get me wrong, I'm sure they're brilliant -- *for college students* (actually I'm not so sure about that either, but even if they actually are at the top of their class, that does not mean they have any good experience). I chose to donate time and money to another project with more competent developers. They did nothing to prove

    • Re:BAD slashdot! (Score:4, Insightful)

      by Carnildo ( 712617 ) on Thursday September 23, 2010 @03:20PM (#33679746) Homepage Journal

      Someone wrote a blog post to point out some security issues that need fixing in the pre-Alpha version of Diaspora, and here you are using his words for pointless sensationalism that undermines the work of the Diaspora team and propagates the "Diaspora is shite" gossip that will most certainly haunt the project even after the code has hit Beta. Shameful.

      These aren't "security issues that need fixing". These are "My First Web Application"-level mistakes -- things like failure to sanitize input, allowing code injection and SQL injection, and assuming that "user is logged in" or "user provided the super-secret URL" is equivalent to "user is allowed to do this". If these errors are as pervasive as the article says, the best thing that could happen to the code is a ground-up rewrite.

  • by Meditato ( 1613545 ) on Thursday September 23, 2010 @11:16AM (#33676626)

    I don't really understand what's wrong with this blog author, this "Patrick" fellow. Diaspora is git-release of a pre-alpha. It's essentially proof-of-concept which was released so we can have a look at it and contribute. The author's "if this is OSS, we're screwed" assertion apparently ignores the fact that Chromium, Mozilla, Linux, and dozens of other open source projects work perfectly fine. Additionally, the "their code is unprofessional" accusation is simply wrong-headed. It was never intended to be "professional", so there's no way for it to be "unprofessional". It's a foundation released to the public that other people can build on.

    As for all this worry about zero-day holes...every piece of software has them. If you think that these kids aren't professional because they can't make a perfect, idealized, secure pre-alpha, then you're riding the slopes of a Nirvana fallacy. The entire reason it was open-sourced was to allow researchers the opportunity to improve the code INSTEAD of going public in order to gain visits to their arrogant blog posts and acting like there's some huge problem not covered by the disclaimer. OOPS SORRY IS THAT TOO CLOSE TO HOME, PATRICK? I have never seen more arrogant douchebaggery in a security blog post. This "these are errors that shouldn't be present in any code!" bullshit is a result of Patrick and his circlejerk buds building the project up in their own heads, then being disappointed when the pre-alpha wasn't a facebook-killer.

    Yes it has errors. But the very fact that it's 1) open source, and 2) being debugged even by douches such as Patrick, means that the whole "OSS Diaspora" concept ACTUALLY WORKS IN PRACTICE.

    • Simple read the blog a bit the author is a crap ware distributor and he probably commissioned the article. Not that it matters much but if I you are really pissed about it crank up a compiler with a couple of dictionary files and write a open source version of his fantastic "bingo card printing software". If you take your time, a couple of hours at most I am sure you can top what he is charging 30 bucks for.

    • by gaspyy ( 514539 ) on Thursday September 23, 2010 @11:35AM (#33676920)

      You are right to a point.

      The way I see it, the real problem is not that Diaspora has bugs; the problem is that it has fundamental bugs, bugs so fundamental that they question authors' understanding of the framework they're working with. It's bugs that shouldn't have been there at all.

      Not verifying whether or not a user has the rights to edit an object is something pretty fundamental in my book.

    • by Abcd1234 ( 188840 ) on Thursday September 23, 2010 @11:40AM (#33676982) Homepage

      I don't really understand what's wrong with this blog author, this "Patrick" fellow. Diaspora is git-release of a pre-alpha. It's essentially proof-of-concept which was released so we can have a look at it and contribute.

      And it contains flaws in its security architecture that are so basic, so deeply fundamental, that it's impossible to have any confidence in the development team. Security and scalability *must be architected up front*. Tacking it on after the fact is a recipe for disaster. And it's blatantly obviously that the people working on the project don't understand this.

  • http://groups.google.com/group/diaspora-dev/browse_thread/thread/4cd369bdf16a346f [google.com]
    (My comments, starting with: "Here are some general thoughts about how Diaspora might relate to the
    Semantic Web and a Social Semantic Desktop, and how that might make it even
    more awesome to encourage everyone to migrate to it.")

  • Sheesh. I know that the modern slashdot man is ahisotorical but this is the 2nd time in a week that this PR shite is being shoveled.
  • Impatience (Score:2, Insightful)

    by doomcup ( 1756450 )
    I think the reason behind all the bile being tossed at Diaspora is probably because of the hype attached to the project and people not realizing that a pre-alpha release isn't the same thing as a finished product at all. They just see "...Diaspora...released..." and jump to the wrong conclusion, not realizing that it isn't the final version. I'm eager to see where Diaspora goes once it's cleaned up.
  • by codepunk ( 167897 ) on Thursday September 23, 2010 @11:22AM (#33676736)

    Read the authors blog just a bit, I am not really sure the guy even wrote this article he may have had it commissioned. The author is a crapware distributor and this article is nothing more
    than a attempt at driving traffic to his site which worked. Now his claim to fame is some "bingo card printing software for teachers".

    A few minutes with a compiler and a few dictionary files will show him exactly what "Open Source" is good for. I could really care less about what he wrote but if I was pissed about it there would be a new open source bingo card printing software package released within the next two hours.

    • Re: (Score:3, Interesting)

      by sorak ( 246725 )

      Or if you're pissed and lazy, you can find others [sourceforge.net] to do it for you.

  • by hawguy ( 1600213 ) on Thursday September 23, 2010 @11:58AM (#33677224)

    There was no "launch", this was an alpha code release. Alpha code often has bugs, sometimes major. They even called it a "Developer Release". So I don't understand the uproar about *gasp* bugs in alpha code! If they had branded it beta code then I'd be more concerned with fundamental bugs, but even the developers said it had security bugs when they released it:

    http://www.joindiaspora.com/2010/09/15/developer-release.html [joindiaspora.com]

    Feel free to try to get it running on your machines and use it, but we give no guarantees. We know there are security holes and bugs, and your data is not yet fully exportable. If you do find something, be sure to log it in our bugtracker, and we would love screenshots and browser info.

  • by MobyDisk ( 75490 ) on Thursday September 23, 2010 @12:06PM (#33677334) Homepage

    Security is part of the design, not the implementation.

    Most developers still haven't learned that security isn't something you check for at various access points in the code: it is something you build directly into the business layer. For example, your code should not have a method like this anywhere:

    public DeletePicture(int pictureID)

    The method should be:

    public DeletePicture(SecurityCredentials user, int pictureID)

    This way it is impossible for your web to accidentally call DeletePicture() without checking for security. The security check is built-in to the lower-level and there is nothing you can do about it. Having worked on secure web services before, I realize I did not do this in my design, which was great for making simple tools, but it meant that all user-facing code had to have checks for security loopholes. The web is especially weird because users can hack the pages and the HTTP requests to call your methods in ways you never

    • by Paul Fernhout ( 109597 ) on Thursday September 23, 2010 @01:44PM (#33678580) Homepage

      As I said here: http://groups.google.com/group/diaspora-dev/msg/17cf35b6ca8aeb00 [google.com]
      "The central issue many people are concerned about (reading comments elsewhere) is that security is not an "add on". ... Ideally (though few manage this), security needs to be woven intrinsically and mutually throughout an entire endeavor at all levels of the social process, and from beginning to end, from recruitment to developer training to coding standards to code reviews (or whatever works) to archiving procedures to product announcements to bug fix procedures to communications with the public, as well as at all levels of the code itself, the tests, and so on. For many situations, security is often like a chain -- any weak link makes it fail. The less a project embodies this end-to-end security ethic, the more constant vigilance or constant exercise of power is required by everyone involved in it (extrinsic security and/or unilateral security). ...
          So, in that sense, security is cultural. If you try to bolt on security after the fact (like trying to use a big military to defend long oil supply lines instead of having local power sources like solar panels, or trying to be the one who has all the power and everyone is afraid of rather than being the one who has a lot of friends who all share power and look out for each other) you end up spending a lot of time, money, and lives on "security" and you possibly still end up insecure. :-( ...
          Unfortunately, intentional or not, the first Diaspora release has been taken by some people to be a statement about the culture of Diaspora development as regards end-to-end security, even if it was not an intentional statement or even it it perhaps may not be accurate assessment relative to intent or plans. So, it is going to take a bit of work to recover from that, but no doubt it can be done by showing steady progress to creating a developer culture that has a security mindset woven throughout it.
          So how does one get security in practice, assuming you want to do it end-to-end? What engineering attitude may be best to cultivate within that mindset?
          Often, the best security is just simplicity. ..."

You can be replaced by this computer.

Working...