Unfortunately I'm not so familiar with the config of java-shindig that I
could tell you where exactly you could find it, but yes the workings are
quite similar.

On Tue, Jan 27, 2009 at 5:59 AM, Harry Hübner <[email protected]> wrote:

> Hi Chris,
>
> thanks for your answer.
> I have searched the config entries. They are only available in the
> container.php file. I am working with the java version. Is there some
> similar mechanism?
>
> Thanks
> Harry
>
>
>
> Am 21.01.2009 um 15:05 schrieb Chris Chabot:
>
>
>  Hey Harry,
>>
>> The BasicSecurityToken class is actually production ready, the basic
>> implies
>> that you could replace it with your own implementation if you wanted too,
>> but it's not required to do so to get a secure situation.
>>
>> That is, as long as you disable 'allow_plaintext_token' and set the
>> 'token_cipher_key' and 'token_hmac_key' to hard to guess random strings
>> (make sure to update these in both partuza's and shindig's configs).
>>
>> As long as the keys are hard to guess (random generated strings work
>> better
>> there then dictionary words for instance), a 'hacker' would have a very,
>> very hard time guessing the correct cipher and hmac keys, especially since
>> a
>> brute force method would have to check every possible key combination
>> against the social end point of the social site, which after a few million
>> requests with invalid security tokens is bound to get noticed :) Also
>> having
>> to test every possible key over the internet severely limits the amount of
>> keys/second (s)he could test.
>>
>> About the potential impact, yeah *if* a token was guessable, a remote
>> party
>> could access the social data on the social networking site pretending to
>> be
>> a real user, either through a gadget, or more likely through the REST
>> interface; But again the chances of this happening are very unlikely, as
>> long as you disable the plain text token, and set proper cipher and hmac
>> keys.
>>
>>   -- Chris
>>
>> On Wed, Jan 21, 2009 at 11:12 AM, <[email protected]> wrote:
>>
>>  Hi,
>>>
>>> I have a question about securitytokens.
>>> Using the class BasicSecurityToken to generate tokens is only thought to
>>> be
>>> used for testing purposes.
>>> Digging through the partuza code, I have seen the usage of this in
>>> Partuza
>>> too.
>>> I am wondering how a site can be vulnerable, if the generated token is
>>> not
>>> secure?
>>>
>>> My assumption:
>>> Any hacker makes a request to a container he wants to affect. For this he
>>> writes a gadget to read all the opensocial data via opensocial api calls.
>>> To get access to the gadget container he generates the same token the
>>> container site would create. So he is able to read all the opensocial
>>> data
>>> of the container.
>>>
>>> Is this right?
>>>
>>> Thanks
>>> Harry
>>>
>>>
>>> Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends, mehr
>>> Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und
>>> optional 60 Pay TV Sender, einen elektronischen Programmführer mit Movie
>>> Star Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende
>>> Dokus in der Arcor-Videothek. Infos unter www.arcor.de/tv
>>>
>>>
>

Reply via email to