RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
> -Original Message- > From: Matt Bathje [mailto:[EMAIL PROTECTED] > Just hope they don't break you programming policies and extend > ValidatorForm (or just use DynaValidatorForm!) instead of extending > SafeValidatorForm :) Well, its easier that wondering if all the validations are imp

RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
ch. ;-) -Original Message- From: Matt Bathje [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 03, 2004 5:22 PM To: Struts Users Mailing List Subject: Re: hacker-proofing Struts-based exposed websites (1) Yes, you would have to do it for every form in the application. .. (2) Is th

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Matt Bathje
Seetamraju, Uday wrote: Like you, that's what I thought initially, until the security scanning application report hit me. For each simulated attack (including null-characters and other characters) our *.do URLs were showing errors and exceptions in all their full glory right on the web page. Take

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Matt Bathje
Yes, you would have to do it for every form in the application. To me that isn't an issue though because for most (I'd say 95%+) of the forms in my application, I already have a validator entry set up - I would just need to add the invalidCharacter validation and its variables to each form. If

RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
Like you, that's what I thought initially, until the security scanning application report hit me. For each simulated attack (including null-characters and other characters) our *.do URLs were showing errors and exceptions in all their full glory right on the web page. That was the basis for my i

RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
. -Original Message- From: David G. Friedman [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 03, 2004 2:13 PM To: Struts Users Mailing List Subject: RE: hacker-proofing Struts-based exposed websites Uday, I'm afraid you maybe mistaken on at least one of your points. At least the HTML t

RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
- From: Matt Bathje [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 03, 2004 3:48 PM To: Struts Users Mailing List Subject: Re: hacker-proofing Struts-based exposed websites [snip] . invalidCharacters \u,\u0

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Vic Cekvenich
There are known hacks, some dealing with buffer overruns of the server that gives you acess to the OS shell, or port scans or sniffing, or ... So I see you have apache 1.3 (with it's known hacks) in front of it. I assume you read up on securing apache. I think very little has to do w/ Struts i

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Matt Bathje
[snip] if you feel comfortable typing in struts validations in each and every form class of each and every application, who can stop you? And you are also quite free to edit each and every one of them should you you want to add a new kind of check to your forms. Even if you choose to use the stru

RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread David G. Friedman
aju, Uday [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 03, 2004 2:01 PM To: Struts Users Mailing List Cc: [EMAIL PROTECTED] Subject: RE: hacker-proofing Struts-based exposed websites Sure. I never mentioned that I was adding totally new functionality to struts. if you feel comfortable

RE: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
Wednesday, November 03, 2004 11:22 AM To: Struts Users Mailing List Cc: [EMAIL PROTECTED] Subject: Re: hacker-proofing Struts-based exposed websites Maybe I should wait for other commentary on this because I'm probably missing something...but after scanning your page for a bit, I'm not

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Bill Chmura
I can't really speak to the actual code or process itself as I have not worked with struts in a little while - but anytime something is labled as "hacker proof" it kind of sticks under my nail. Maybe its more aptly "securing validation", but I cannot imagine that this would "hacker proof your

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Wendy Smoak
From: "Seetamraju, Uday" <[EMAIL PROTECTED]> > The entire details are in one nice HTML web page that I wrote up just for this. > http://mysite.verizon.net/sarma/GNU/SafeValidatorForm.html The part that caught my eye was 'testing' it by entering the entire URL to the jsp file. Most of us already p

Re: hacker-proofing Struts-based exposed websites

2004-11-03 Thread Matt Bathje
Seetamraju, Uday wrote: We are putting some websites open to all IP addresses using Appservers. We have successfully stayed well within JSTL and Struts. My google searches didn't get me to any open information on how to use struts in a safe manner. So, I had to start inventing the wheel. I hope I

hacker-proofing Struts-based exposed websites

2004-11-03 Thread Seetamraju, Uday
We are putting some websites open to all IP addresses using Appservers. We have successfully stayed well within JSTL and Struts. My google searches didn't get me to any open information on how to use struts in a safe manner. So, I had to start inventing the wheel. I hope I didn't spend this much