Ajas,
Your model is broken. Not to say I have never implemented a similar
solution, I have. But it is a poor solution which can be
significantly improved. (I run into these all the time on penetration
tests, so you are not the first or last to try this...)
A valid, strong solution would pass the structure from server to
server via a back channel and avoid the user altogether. If done over
SSL, there is no need for encryption (beyond the SSL). A unique, time
limited, highly random token (not a UUID) would be used to identify
the transaction and that is the only information needed by the user,
this clearly needs to be provided in the transaction passed via the
back channel and should be created from a secure random number
generator. The server receiving the SSO request (target server)
would need to maintain state of all requests passed by the back
channel and remove those requests from its queue when they time out
(e.g. <2 minutes after receipt) or when the valid request from the
user containing the SSO identifier is received by the target server.
There is little extra work needed for this solution, but the long term
time/effort savings are huge by not having to deal with the problems
brought up by encryption. Might as well get it right the first time,
rather than having to recode a proper solution later after you find
out why yours is broken, right?
-dhs
Dean H. Saxe, CISSP, CEH
[EMAIL PROTECTED]
"A true conservationist is a person who knows that the world is not
given by his fathers, but borrowed from his children."
-- John James Audubon
On Jul 30, 2008, at 11:10 AM, Ajas Mohammed wrote:
Hi,
Thanks everyone for the suggestions. Those suggestions were really
helpful.
Sean, CreateUUID looks like a good idea. I will use it in addition
to my logic. Anyone wants to comment anything about that approach.
Dean, The reason I want to encrypt is because I plan to pass a
structure as url parameter using wddx and I want to pass it over
encrypted, otherwise it looks like simple xml with all values easily
seen in url.I have to use wddx because I cant pass structure as url
parameter.
Shawn, agreed about management. Honestly, no one asked me todo this.
I want to make it as safe as possible using the help from some great
minds we have in this group. ;-) .
Ajas.
On 7/29/08, [EMAIL PROTECTED] <[EMAIL PROTECTED]
> wrote: Return Receipt
Your Re: [ACFUG Discuss] cflocation with variables
encrypted, is
document: it safe approach?
was [EMAIL PROTECTED]
received
by:
at: 07/29/2008 06:01:18 PM
-------------------------------------------------------------
To unsubscribe from this list, manage your profile @
http://www.acfug.org?fa=login.edituserform
For more info, see http://www.acfug.org/mailinglists
Archive @ http://www.mail-archive.com/discussion%40acfug.org/
List hosted by http://www.fusionlink.com
-------------------------------------------------------------
--
<Ajas Mohammed />
http://ajashadi.blogspot.com
We cannot become what we need to be, remaining what we are.
No matter what, find a way. Because thats what winners do.
You can't improve what you don't measure.
Quality is never an accident; it is always the result of high
intention, sincere effort, intelligent direction and skillful
execution; it represents the wise choice of many alternatives.
-------------------------------------------------------------
To unsubscribe from this list, manage your profile @
http://www.acfug.org?fa=login.edituserform
For more info, see http://www.acfug.org/mailinglists
Archive @ http://www.mail-archive.com/discussion%40acfug.org/
List hosted by FusionLink
-------------------------------------------------------------
-------------------------------------------------------------
To unsubscribe from this list, manage your profile @
http://www.acfug.org?fa=login.edituserform
For more info, see http://www.acfug.org/mailinglists
Archive @ http://www.mail-archive.com/discussion%40acfug.org/
List hosted by http://www.fusionlink.com
-------------------------------------------------------------