معرفی شرکت ها


dm.zope.session-1.2


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

ZODB based heavy duty Zope session implementation.
ویژگی مقدار
سیستم عامل -
نام فایل dm.zope.session-1.2
نام dm.zope.session
نسخه کتابخانه 1.2
نگهدارنده []
ایمیل نگهدارنده []
نویسنده Dieter Maurer
ایمیل نویسنده dieter@handshake.de
آدرس صفحه اصلی http://pypi.python.org/pypi/dm.zope.session
آدرس اینترنتی https://pypi.org/project/dm.zope.session/
مجوز ZPL
This package contains a replacement for Zope's ``Products.Transience``, which is typically used to implement Zope's sessions. While ``Products.Transience`` has quite a high risk for ``ConflictError`` if many requests access the Zope session, the current package should be responsible only for very few ``ConflictError``\ s, even if every request accesses the Zope session. This is achieved by a changed organization of the sessions set. ``Products.Transience`` organizises this set into a list of generations. If a session is accessed, it is moved into the newest generation (if not already there). This way, a session access (even a read only session access) can cause a write and result in a ``ConflictError``. ``dm.zope.session`` maintains the sessions in an ``OOBTree`` (which has partial conflict resolution). To support session timeout, the last access time is maintained on the individual session object in a data structure with 100 % conflict resolution. This way, read access to the session should not result in a ``ConflictError``. To reduce ZODB bloat, the access time is not updated on every access but employs a limited resolution, by default about 1/8 of the session timeout. ``Products.Transience`` performs an inline cleanup for outdated sessions. It can do that because its cleanup is very fast (drop the oldest generation and create a new newest one). ``dm.zope.session``'s cleanup involves visiting all sessions and check whether they are outdated. This can be expensive. Therefore, it performs the cleanup offline - in a separate thread. The cleanup uses very short transactions to reduce the risk of conflicts. If you use Zope in a ZEO setup, i.e. serveral Zope processes use the same ZODB, then only one of the Zope processes will run the cleanup thread. It may take until the (old) period of this thread has finished before some configuration changes become effective (especially ``cleanup_period_sec``). In general, this should not make a big problem. Should it be problematic in special cases, you may need to restart this process. You will find its process id in a lockfile under *clienthome* with a name derived from the session container path. **ATTENTION** Like most (server side) session implementations, ``dm.zope.session`` can be vulnerable to denial of service attacks. It is often not difficult to make the server create a new session and each session needs resources; an attacker can try to massively create sessions in order to overload this kind of resource. ``dm.zope.session`` puts its sessions into a ZODB which typically uses a file as storage. This kind of resource usually has a large capacity and therefore is difficult to overload. However, should an overload happen, the consequences can be severe. Please read the section `DOS attacks`_ to learn about some of your options to counter those attacks. Features ======== ``dm.zope.session`` supports the following features. Corresponding configuration variables are specified in parenthesis. Maximal session lifetime (``session_max_lifetime_min``) This feature allows to limit the maximal lifetime of the session. It can be interesting for security reasons: should an attacker have been able to hijack a session, he should only be able to use it for a limited period. In Zope's session architecture, the session id is managed by the so called ``browser_id_manager``. It is using a cookie to pass the session id between browser and server. To be effective, the maximal session lifetime must be combined with a limited lifetime for the session id; otherwise, an attacker can use the known session id to hijack a followup session. In modern Zope versions, the session id is by default stored in a (browser) session cookie. In this setup, an attacker can hijack followup sessions until the user terminates his browser session. The maximal session lifetime is controlled via the configuration variable ``session_max_lifetime_min``. It specifies the maximal lifetime in minutes. A non positive value deactivates the feature. Session inactivity timeout (``session_timeout_min``) A session is deleted when is it not used for about ``session_timeout_min`` minutes. If ``session_timeout_min`` has a non positive value, the feature is deactivated. The timeout feature is not implemented precisely: a session may be deleted slightly before the specified inactivity and may live slightly longer than the specified timeout. There are two reasons for this: 1. to avoid ZODB bloat, the session access time is stored with limited (usually about 1/8 of the session timeout) resolution. 2. session inactivation is performed by a periodic cleanup process. Nothing happens until the next run of this process. The inactivity timeout is an inportant feature for sessions implemented by ``Products.Transience``, because it typically stores sessions in (precious) RAM. ``dm.zope.session`` sessions are typically stored in a ``FileStorage`` for which early freeing resources is of far less importance. However, if you store sensible information in the session, you may still want to use this feature for security reasons: it forces a potential attacker to keep a hijacked session alive for continued exploitation. Session access time resolution (``session_access_time_resolution_min``) This controls whether the session access time is updated: an update is suppressed if the last update was more recent then the access time resolution. ``session_access_time_resolution_min`` specifies an access time resolution in minutes. The effective access time resolution is the minimum of this resolution and about 1/8 of the session timeout where non positive values are ignored. If both resolutions are non positive, the access time is not maintained. Session target number (``session_target_number``) A periodic cleanup tries to keep the number of sessions below ``session_target_number`` by deleting the oldest sessions. A non positive value for ``session_target_number`` deactivates the feature. Session maximal number (``session_max_number``) ``session_max_number`` limits the number of session objects. The exception ``dm.zope.session.MaximalSessionNumberExceeded`` is raised when the limit would be exceeded. A non positive value deactivates the feature. This option can be used to limit the thread posed by `DOS attacks`_. Periodic session cleanup (``cleanup_period_sec``) A periodic cleanup process deletes sessions whose maximal lifetime or inactivity timeout is reached. It also deletes the oldest sessions to keep the session number below the session target number. ``cleanup_period_sec`` specifies the period for this process in seconds. If it has a non positive value, 10 is used instead. Events For customization purposes, some events are notified. Their interfaces are all defined in ``dm.zope.session.interfaces``. All events are "object events" with either the session or the session container as event object. ``ISessionCreatedEvent`` Notified when a new session object is created. Can be used to transfer information from the request to the session, e.g. information potentially helpful to detect `DOS attacks`_. ``IMaximalSessionNumberExceededEvent`` Notified when the maximal session number is reached. Can be used to implement a custom policy to delete sessions in such a case in order to let the operation succeed. Note, however, that the deletion of the same session by concurrent requests leads to an unresolvable conflict (only one of those requests will succeed); it is therefore advicable to choose the session to be deleted with considerable randomness. ``ISessionCleanupEvent`` Notified during each cleanup round. Can be used to implement a custom cleanup policy, e.g. check for `DOS attacks`_ or enforce a "One session per user" policy. Note that this event is notified in a separate thread outside the typical Zope request context; only very few "services" are available. Installation ============ Unfortunately, it is more difficult to use Zope sessions implemented by ``dm.zope.session`` than those implemented by ``Products.Transience``. In the latter case, all you need to do is installing ``Products.Sessions`` and (maybe) (slightly) extending your Zope configuration file. To use ``dm.zope.session``, you must install both it and ``Products.Sessions``, ensure that the ZCML configuration of ``dm.zope.session`` is executed during startup and then [re]configure Zope's session machinery via the ZMI (= "Zope Management Interface"). To facilitate this configuration, we sketch first Zope's session architecture. Zope's session architecture --------------------------- The various subtasks related to session management are delegated to different cooperating Zope objects: ``session_data_manager`` This objects makes the session available via the request object. It uses the ``browser_id_manager`` to generate a session id and a session container (called "transient object container") for the storage of the session objects. By default, the session container is located at ``/temp_folder/session_data``; this can be changed via the ZMI. ``browser_id_manager`` This object is responsible to assign session ids (called browser ids, because they in fact identify the browser). session container This is an object used to store (and manage) the sessions. Its path is determined by the ``session_data_manager``; by default, it is ``/temp_folder/session_data``. ``temp_folder`` By default, this is a mount point. The mount point is configured in the Zope configuration file (``zope.conf``). Typically, it mounts a ``Products.TemporaryFolder.TemporaryContainer`` from a ``tempstorage`` with name ``temporary``. A ``tempstorage`` maintains its data in RAM; therefore, the data is lost on restart. To (partially) counter this data loss, Zope creates (typically) a session container named ``session_data`` with values from the Zope configuration file on startup. ZMI configuration for ``dm.zope.session`` ----------------------------------------- There are various options to configure for the use of ``dm.zope.session``. The easiest way is to create a ``dm.zope.session:Container`` (via the ZMI) somewhere (but not below ``temp_folder`` where it would be lost on restart) and then let the ``session_data_manager``'s ``Transient Object Container Path`` point to its location. This puts the sessions into the main ZODB. You might want to maintain the sessions in their own ZODB, e.g. to use different parameters (such as e.g. cache size) for sessions and the main content or use different pack parameters and/or frequencies. To do this, you would configure a mount point in the Zope configuration file (likely similar to the definition for the ``main`` ZODB -- do not use ``temporarystorage``!), add a corresponding mount point in the main ZODB (via the ZMI) and then put there the session container. Should you use Plone, you likely would need to disable its CSRF protection or put the session container into a mounted ZODB with name ``temporary``: Plone's CSRF protection looks for ZODB writes and usually allows them only, if the request is "authenticated". To support session access (which might cause writes even for a read access), it allows writes to objects in ``temporary`` also for unauthenticated requests. Likely, your Zope configuration file already contains a definition for this ZODB, adapted for Zope's standard sessions and based on ``temporarystorage``; you would need to replace it by one for ``dm.zope.session`` (i.e. similar to the definition for the ``main`` ZODB and especially not using ``temporarystorage``). Use === The typical session setup (by ``Products.Sessions``) makes the current session available as *request*\ ``["SESSION"]`` where *request* represents the request object. The session behaves similar to a Python ``dict``. In addition, you can use the methods ``set`` and ``delete`` to set a session "variable" or delete one, respectively. ``dm.zope.session``'s sessions are (like those of ``Products.Transience``) ZODB based. This has an important implication: the request does not work with the session directly but with a local copy of the session object maintained in the ZODB. When the request changes the session, then in the first place it only changes the local copy. Some changes are recognized by the ZODB -- this includes changes to the session itself and changes to other "persistent object"s -- and cause the modifications to update the affected persistent objects in the ZODB when the request finishes successfully. In this case, followup requests will see the modifications. Other changes (to non persistent objects, e.g. lists, dicts, most class instances, ...) are **NOT** recognized automatically and are not written to the ZODB. In such a case, some followup requests may see the modifications but others will not. If you use complex ("mutable") values for your session variables, try to use "persistent objects" (the package ``persistent`` has persitent variants of lists and mappings) or reassign a the value to the session variable after you have changed it, e.g.:: complex_value = session["var"] # modify complex_value via its methods session["var"] = complex_value The code above will ensure that the change will be written to the ZODB if the request succeeds (does not fail with an exception). DOS attacks =========== ``dm.zope.session`` can be vulnerable to denial of service (DOS) attacks. In such an attack, the attacker would try to force the server to massively create new sessions. Each of those sessions needs resources (typically file space for ``dm.zope.session``). The attacker's aim would be to overload this kind of resource and get the site (and maybe other services using the same resource kind) in trouble. ``dm.zope.session`` has not enough knowledge to prevent this kind of DOS attacks. However, it has features to limit the potential damage and to help detecting and handling such attacks. The simplest approach is to limit the number of sessions by giving the configuration parameter ``session_max_number`` a positive value. This limits resource usage. However, if you have put data vital for the use of your site into the session, your site may still no longer function properly because no new sessions can be created during the attack. Therefore, try not to use the session for the most fundamental services of your site - use cookies instead. An alternative approach would be to try to detect and handle attacks. ``dm.zope.session`` notifies some events to help you with this. An ``ISessionCreatedEvent`` is notified whenever a new session object is created. You can register a handler to add information to the session which helps to detect and/or handle potential attacks; potentially, the handler also performs the detection and handling itself. An ``IMaximalSessionNumberExceededEvent`` is notified when the maximal session number would be exceeded. In a correspoding handler, you can try to delete sessions based on custom policies. Potentially, you try to detect a potential attack and delete related sessions. ``dm.zope.session`` notifies an ``ISessionCleanupEvent`` during each cleanup round. DOS detection and handling could also be implemented in its handler; note, however, that it runs "offline" (not inside the typical Zope request context) and that it can use only very few Zope services. Any attack comprises a large number of requests, all under the control of the attacker. To detect an attack, you must be able to recognize sessions which may have been created by the attacker. A fairly reliable way would be to use the session only for authenticated users (and e.g. use cookies for all services provided for anonymous users). In this case, you could store the corresponding user id in the session. If an attack is suspected, you could visit all sessions, check for users with an unexpected number of sessions and delete those, maybe even disable the user. If you must use the session for anonymous users, you can try to use the request's IP address in place of the user id. Note, however, that this is far less reliable as many organisations grant internet access only through proxies; then all organization members use the same IP address. Therefore, it is much more difficult to distinguish normal use from an attack. Sessions have properties ``created`` (a timestamp float) and ``created_date`` (``DateTime``) indicating when the session has been created; they can help with this distinction. Note, that advanced attackers may use a large number of (hijacked) clients; in such a case, the attacking requests would come from different IPs; the "created" properties might still be used to find candidates for attacker sessions - again with reduced reliability. Maintenance =========== The sessions managed by ``dm.zope.session`` are typically stored in a ``FileStorage``. Such a storage not only keeps the current state but also historical data (important e.g. for conflict resolution, "undo" and analysis of past events). To get rid of old, no longer used information, you must regularly "pack" the storage. This is particularly important for a storage hosting sessions as sessions tend to be much more frequently changed than "normal" objects and more frequent changes mean more irrelevant historical data. History ======= 1.2 Python 3.10 compatibility 1.1 * ``Session`` objects now have methods ``invalidate`` and ``isValid`` (used by Plone) * ``Session`` objects referenced by events are now acquisition wrapped * more expressive function names for easy recognition of ``dm.zope.session`` transactions * avoid cleanups (and associated transactions) if no new sessions have been created 1.0 Initial version


نحوه نصب


نصب پکیج whl dm.zope.session-1.2:

    pip install dm.zope.session-1.2.whl


نصب پکیج tar.gz dm.zope.session-1.2:

    pip install dm.zope.session-1.2.tar.gz