Hacker Newsnew | past | comments | ask | show | jobs | submit | meghan's commentslogin


Seems similar to Apple's 2015 acquisition of FoundationDB -- they sunset the commercial offering. But it's unclear if they acquired Styra or just hired the team?

I'm maintaining an article about this news (as well as commercial alternatives to OPA) on the Oso blog: https://www.osohq.com/post/opa-maintainers-join-apple-oss-co...

Disclaimer is that I work with Oso :-) but hope it will be helpful regardless.


This is a more defensible take than some on here, but still a wild comparison. FDB was closed source software that existing customers kept source access to the entire time it was closed, and then opened under a permissive license soon after. So yes, you couldn’t buy it, but if you had, you kept access to new development.


Yes, similar discussion across two separate articles: (1) article from General Analysis on "Supabase MCP can leak your entire SQL database" (2) article from Oso talking about why authorization in AI is hard, what to do about it, which references the General Analysis article


MongoDB employee posting:

Out of an abundance of caution, we cast a wide net and contacted all current and past MongoDB users, including those that may have closed their MongoDB Atlas Projects. If you would like to have your contact information completely deleted from our systems, please file a GDPR deletion request: https://www.mongodb.com/legal/privacy-policy/request-for-del...

You can reach out to me directly for assistance with this, if needed. My email is my first name at mongodb dot com.


MongoDB employee posting:

The login issues are unrelated to the security incident. We notified all of our customers and users concurrently resulting in a spike in login attempts. Please try again in a few minutes if you are still having trouble logging in.

Please continue to monitor our alerts page: https://www.mongodb.com/alerts


I mean that totally sounds related (hah!) although I guess we all know what they mean


That’s a funny point, I guess I never really though of whether “related” was more correlation or causation.


Seems like they have bindings for several languages, but I think Python was the first language they supported


Nice post. This covers how you'd model the permissions, etc. but do you have any articles/docs on how you'd actually integrate this into an application?


Thanks! And great question. We cover adding oso to applications in this guide, which includes a sample app: https://docs.osohq.com/getting-started/application/index.htm...


Cool - congrats! Would love to hear more about why you chose Rust for this?


Thank you! We chose Rust for a few main reasons:

- It's an ideal language for writing security-focused software given that it eliminates memory safety bugs (a leading cause of security vulnerabilities in the wild).

- Authorization is generally on the critical path, so providing a decision quickly is very important. Rust is extremely fast, but more crucially it doesn't have runtime garbage collection so there's no possibility of an ill-timed GC run disrupting your application.

- Rust has a great language interoperability story. We designed oso as a library that you embed in your application. The upshot of that is that we've already built Java, Python, and Ruby libraries, with additional languages to follow. Using Rust allowed us to write the core logic and runtime once in a correct, extremely performant language and then write the language libraries as thin shells around the Rust core. That lowered the bar for expanding oso to new languages pretty dramatically.


Meghan from MongoDB here.

Agree that eventual consistency is inappropriate for the majority of database workloads. This is why we has always defaulted to strong consistency, by reading from primary nodes in a cluster. (Because eventual consistency is sometimes useful, MongoDB offers eventual consistency, too.)


We take security seriously at MongoDB. Here is a response on security best practices from the MongoDB CTO & Co-Founder:

http://www.mongodb.com/blog/post/mongodb-security-best-pract...


The first point in your article is:

> "The most popular installer for MongoDB (RPM) limits network access to localhost by default."

The first download for Linux at https://www.mongodb.org/downloads is:

> https://fastdl.mongodb.org/linux/mongodb-linux-x86_64-2.6.7....

At the bottom of the page there are alternate links to packages. Here is the description:

> "MongoDB is included in several different package managers. Generally speaking, it is easier to simply install the prebuilt binaries from above."

If the properly packaged versions have secure defaults, maybe you should steer people towards them?


Thanks for the suggestion, we will be updating the copy to clarify that the packages are the preferred installation method.


Thanks for listening!


As I understand things based on the OP it seems however your documentation promotes the insecure way of setting up mongodb. It's even true that mongodb doesn't even ask to create db credentials during the installation,something it should do by default.


the real problem is lack of network protections. there are many things on the internet unprotected. this article is not news. dont put your database on the internet.


Security is a matter of layers, like an onion, it's not just an either-or. Any sensible database or database-like software does not come with authentication disabled by default. Yes, your DB should be behind a firewall, but if RedHat installed out of the box without a root password you wouldn't say "well your server should be behind a firewall anyway."


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: