aboutsummaryrefslogtreecommitdiffstats
path: root/railties/guides/source/security.textile
diff options
context:
space:
mode:
authorXavier Noria <fxn@hashref.com>2010-12-15 20:18:36 +0100
committerXavier Noria <fxn@hashref.com>2010-12-15 20:18:36 +0100
commit3c9486f487384f65dfadae0b2f9045157963cbd9 (patch)
treefb2747d40ea33b29b238a66795dea5ae9b531332 /railties/guides/source/security.textile
parent5d78b4c6f7829498e5d2a8cd4fceca0e24a3f64e (diff)
parent80382c7465af27194dc9644b8ba4c4ad458b7ef7 (diff)
downloadrails-3c9486f487384f65dfadae0b2f9045157963cbd9.tar.gz
rails-3c9486f487384f65dfadae0b2f9045157963cbd9.tar.bz2
rails-3c9486f487384f65dfadae0b2f9045157963cbd9.zip
Merge branch 'master' of git://github.com/lifo/docrails
Diffstat (limited to 'railties/guides/source/security.textile')
-rw-r--r--railties/guides/source/security.textile4
1 files changed, 2 insertions, 2 deletions
diff --git a/railties/guides/source/security.textile b/railties/guides/source/security.textile
index 528c8861d4..fbafc40d93 100644
--- a/railties/guides/source/security.textile
+++ b/railties/guides/source/security.textile
@@ -524,10 +524,10 @@ h4. Logging
-- _Tell Rails not to put passwords in the log files._
-By default, Rails logs all requests being made to the web application. But log files can be a huge security issue, as they may contain login credentials, credit card numbers et cetera. When designing a web application security concept, you should also think about what will happen if an attacker got (full) access to the web server. Encrypting secrets and passwords in the database will be quite useless, if the log files list them in clear text. You can _(highlight)filter certain request parameters from your log files_ by the filter_parameter_logging method in a controller. These parameters will be marked [FILTERED] in the log.
+By default, Rails logs all requests being made to the web application. But log files can be a huge security issue, as they may contain login credentials, credit card numbers et cetera. When designing a web application security concept, you should also think about what will happen if an attacker got (full) access to the web server. Encrypting secrets and passwords in the database will be quite useless, if the log files list them in clear text. You can _(highlight)filter certain request parameters from your log files_ by appending them to <tt>config.filter_parameters</tt> in the application configuration. These parameters will be marked [FILTERED] in the log.
<ruby>
-filter_parameter_logging :password
+config.filter_parameters << :password
</ruby>
h4. Good Passwords