Thanks everyone for the replies.
Thanks Dean for giving a detailed insight about encryption and back channel.
Thanks Sean for CreateUUID example.
I am glad I am not using encryption now because crazy things were happening,
beyond my control.
I am sticking to the idea suggested by pretty much
Ajas,
FWIW, you can either push the info to the remote site to be identified
by the ID or have the remote site pull it from you. Your choice,
really.
-dhs
Dean H. Saxe, CISSP, CEH
[EMAIL PROTECTED]
I have always strenuously supported the right of every man to his own
opinion, however
Hi,
Thanks everyone for the suggestions. Those suggestions were really helpful.
Sean, CreateUUID looks like a good idea. I will use it in addition to my
logic. Anyone wants to comment anything about that approach.
Dean, The reason I want to encrypt is because I plan to pass a structure as
url
BTW, the reason your solution is inappropriate is because you have
allowed the user to control the transaction by controlling the data
passed between the two systems. By passing the data via a back
channel you can remove the user from the authentication mechanism
between the two systems
If I discover the URL, what prevents me from using this same URL again?
On Tue, Jul 29, 2008 at 3:28 PM, Ajas Mohammed [EMAIL PROTECTED] wrote:
Hi,
I am implementing single sign on and after I verify user credentials, I have
to redirect user to secure area which has its own login verification
, 2008 3:28:01 PM
Subject: [ACFUG Discuss] cflocation with variables encrypted, is it safe
approach?
Hi,
I am implementing single sign on and after I verify user credentials, I have to
redirect user to secure area which has its own login verification through uname
pwd textbox, the usual way
Crap Cam, you type faster than I do... I'd just posed the replay attack problem.
- Original Message
From: Cameron Childress [EMAIL PROTECTED]
To: discussion@acfug.org
Sent: Tuesday, July 29, 2008 3:36:56 PM
Subject: Re: [ACFUG Discuss] cflocation with variables encrypted, is it safe
Are you using IIS/Kerberos authentication where it's all handled on the
server and pulling who it is from there - or is your SSO handled through a
separate application where (for instance) an encrypted cookie is set so
applications across several servers can utilize the cookie for
authentication -
On Tue, Jul 29, 2008 at 4:11 PM, Ajas Mohammed [EMAIL PROTECTED] wrote:
Shawn/Cameron, yeap thats a big hole and I plan to use timestamp to avoid
it, but I dont know right now exactly how that will be done.
Using any predictable or easy to guess information (like a timestamp)
is not a good
Thanks for suggestion Cameron.
Before we get into that, Let me take one step backwards.
How will someone get my url. Here is the process explained in detial.
there are 2 parties. one identity provider(Idp) and other service
provider(SP) i.e. me.
identity provider has there own server to
Packet sniffers. Server logs. Pick your poison.
Sent via BlackBerry by ATT
-Original Message-
From: Ajas Mohammed [EMAIL PROTECTED]
Date: Tue, 29 Jul 2008 16:45:51
To: discussion@acfug.org
Subject: Re: [ACFUG Discuss] cflocation with variables encrypted, is it safe
approach?
Thanks
From a security standpoint, CFLOCATION is the same as clicking a link
in a broswer (since CFLOCATION actually just send a relcation command
to the browser). URL vars from CFLOCATIONs may be found in IIS logs,
browser cache files, or observed in transit.
That makes it quite significant in your
Do not encrypt the values. You should send the values via a back
channel with a non-spoofable, non guessable, time limited (i.e. 2
min) token that is passed to the user and then the user is passed to
the new server (i.e. a client-side redirection using HTTP 3xx series
status codes).
be susceptible to a replay attack. But I'll
defer to Dean if he's listening while on vacation...
- Original Message
From: Ajas Mohammed [EMAIL PROTECTED]
To: discussion@acfug.org
Sent: Tuesday, July 29, 2008 3:28:01 PM
Subject: [ACFUG Discuss] cflocation with variables encrypted, is it
safe
:53 PM, [EMAIL PROTECTED] wrote:
Packet sniffers. Server logs. Pick your poison.
Sent via BlackBerry by ATT
From: Ajas Mohammed [EMAIL PROTECTED]
Date: Tue, 29 Jul 2008 16:45:51 -0400
To: discussion@acfug.org
Subject: Re: [ACFUG Discuss] cflocation with variables encrypted, is
it safe approach
://www.alienetworks.com/Images/LogoLabelHorizontal.gif
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ajas Mohammed
Sent: Tuesday, July 29, 2008 2:28 PM
To: discussion@acfug.org
Subject: [ACFUG Discuss] cflocation with variables encrypted, is it safe
approach?
Hi,
I am
BTW, creating this value in CF can be done, but make sure you don't
use rand(), its not random enough. Get 128 bits of entropy from
javax.security.SecureRandom().
dhs
Dean H. Saxe, CISSP, CEH
[EMAIL PROTECTED]
Dissent is the purest form of patriotism.
--Thomas Jefferson
On Jul 29,
Return Receipt
Your Re: [ACFUG Discuss] cflocation with variables encrypted, is
document: it safe approach?
18 matches
Mail list logo