Tim,

Nice writeups.. I'm glad I brought the topic up this morning because a lot
of good avice and insght has been given.

Everyone does it differently and all we can do is improve on what we thought
"secure" was yesterday.

Mike


> >> 1. If your properly encrypting the url your going to
> change your seed
> >> (key) every request.  That way it is different every time
>
> >What possible value does this bring?
>
> If my user.login is encrypted one time as kjdfljsldfl  and
> the user comes back and types in kjdfljsldfl they don't get
> taken to that circuit, because it's different this time.
>
>
> >> 3. The objection to using cfquery is multifaceted.  There
> is the risk
> >> of SQL injection if your not doing the correct validation.
>  If your
> >> errors are not being handled correctly you can give away table and
> >> column names in the error message.
>
> >So don't you think it's more important to handle errors
> properly than
> >say
> "don't ever use <cfquery>"?
>
> I think that with all the benefits of procedures, if you have
> them available, you're a fool not to use them, and not just
> because of the enhanced security.  Obviously proper error
> handling is important AS WELL.
> This is not an either/or argument, rather a complimentary one.
>
>
> >> 2. By using plain text variable names your going to give the
> >> potential intruder a decent insight into your application
> design, and
> >> this will give them the ability to make educated guesses
> as to your
> >> other circuit names.
>
> >So?
>
> So by understanding the structure of an application, you can
> then begin to analyze it's weaknesses.  In the environment in
> which I work we want to give them as little as possible to go on.
>
>
> >You've got bigger problems should someone gain access to
> your file system.
>
>
> Is that so??  I disagree.  If someone gains access to my web
> server they have nothing.  Now my db which is on the other
> side of a firewall, and only accepts connections from
> specific ips, if they got in that it could become
> problematic.  Why?  Because there are no user names or
> passwords stored on my web server.  There is no way to open a
> direct connection into my db without having a user account on
> the db.  Your rights and roles are also stored in that db,
> not in the application, and so you would not really get
> anything other than images and source code.  You don't even
> get the code of the procedure calls, and so you are still
> blind to the schema of my db.
>
>
> Kwang, again, this is a layered approach to security.  No one
> thing is going to protect you from everything.  You just
> continue to lock down things in order to mitigate risk.  You
> can never be without risk, and anyone who thinks they have
> completely secured their site deserves to be attacked.
> Listen man.  You do whatever you feel comfortable doing.  No
> more, no less.
> But moving towards my CISSP and GSEC, having been a cyber
> threat analyst for the last two years, and soon to be
> managing a federal CERT, I can tell you this, there is always
> going to be some new exploit. It's going to be something you
> didn't think of.  But that zero day exploit isn't going to be
> the one that does all the crazy damage.  It's going to be
> some known vulnerability that you could have prevented from
> putting your system at risk. (slammer, blaster etc.)  By
> duplication of your efforts, by overlapping your protection
> you're trying to create a shell around your application and
> it's data.  Obscurity is just one more tool you can use to do that.
>
[Todays Threads] [This Message] [Subscription] [Fast Unsubscribe] [User Settings]

Reply via email to