Listers,

Sounds to me like you guys need to set a "Birds of a Feather" session about 
hardening the MidTier for use on the public Internet at WWRUG12 next week, huh? 
WWRUG12 has more than a hundred sessions this year, and some of them will touch 
on security issues, but what better way to bring together all of this expertise 
and interest?

Of course, this would be the very first time that a bunch of experts, 
interested parties, customers, software designers and engineers changed the 
world with a couple of beers! 

We'll buy the first round :-). Second one too if it helps.

Seriously, the number of presentation topics and the breath of the curriculum 
has been impressive this year, but even with all this expertise we cannot think 
of or organize every single thing you might want to talk about. We can, 
however, bring all of this talent to the same place and time. The number of ad 
hoc conversations at WWRUG's, BMC User World's and RUG's in their day just 
doesn't happen in other forums. So, in addition to all the formal instruction 
and shared knowledge, the opportunity to organize your own discussion among 
like interests is one of the best reasons to come to WWRUG.

See you in SanJose! Next week!

Doug

--
Doug Blair
+1 224-558-5462

Sent from my new iPad
Auto-corrected typos, misspellings and non-sequiturs are gratefully attributed 
to Steve Jobs :-)

On Oct 8, 2012, at 8:46 AM, "Longwing, LJ CTR MDA/IC" <[email protected]> 
wrote:

> John,
> I would personally be more concerned about someone having a 'clone' of my 
> system and gaining more information than them being able to glean much from 
> error messages.  Yes, I understand that an error message from the underlying 
> vendor db (SQL Server) for example tells them what DB you are running 
> on....but I've never been exceedingly concerned about that...I guess I've 
> never been in a position where the system I support is so critical that 
> someone is going to attack it and any little piece of information provides 
> another nugget of capability to exploit.
> 
> Being in DOD contracting I understand the concerns for security and such, I'm 
> just not sure what they would be do with something like the error they 
> described.
> 
> -----Original Message-----
> From: Action Request System discussion list(ARSList) 
> [mailto:[email protected]] On Behalf Of John Baker
> Sent: Monday, October 08, 2012 7:36 AM
> To: [email protected]
> Subject: Results of a application pen-test - need to close holes
> 
> LJ,
> 
> 2. Improper error handling
> 
> The concern would be that the SQL message may reveal information that allows 
> a third party to establish the type of database, IP address, etc.
> They would then be in a position to mount an attack with information known 
> about that database, ie current security concerns etc.
> 
> 5. Forced browsing
> 
> You correctly identify a good SSO deployment (ie the JSS SSO Plugin :-) as a 
> solution to forced browsing, ie ensuring the user has authenticated before 
> being able to access a resource.
> 
> 
> 
> 
> John
> 
> _______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12 
> www.wwrug12.com ARSList: "Where the Answers Are"
> 
> _______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
> attend wwrug12 www.wwrug12.com ARSList: "Where the Answers Are"
> 

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: "Where the Answers Are"

Reply via email to