Thanks  Eric and Martin for your valuable information, we already have high
security backed network, server and application configuration. Was just
worried about underlying security issues with struts2.

-- 
Thanks & Regards
Srikanth
Software Developer
--------------------------------
eGovernments Foundations
www.egovernments.org
Mob : 9980078913
--------------------------------


On Thu, Oct 17, 2013 at 4:33 AM, Martin Gainty <mgai...@hotmail.com> wrote:

> all initial points of contact to your site should go thru a login process
> with a public key backed by a cert provided by vendor(you)
>
>
>
> if the cert was self-signed or the key is forged you should return a 401
> if the JSSE Key exchange is successful  then yourm session will be
> assigned  a secure token valid only for that Session
>
> and you will now exchange information on SSLv3/TLS Transport which ever
> connector is assigned to handle Secure Traffic
>
>
> The assigned Session-Token would "follow you" thru the system and if your
> tokens Principal was not in Role for the page or resource then client sees
> a 403ed (Forbidden) coming from you
> if ANYTHING does happen to your Session (invalidate or timeout) ...you
> invalidate the secure Token as well
>
> attempts to hack the Token by reading cookies wouldnt work either as each
> assigned Token is calc'ed off of JSESSION-ID by an algo than changes at
> random intervals
> SSLv3/TLS algos change on random intervals..so a cipher/algo worked for
> One session would not work the next session
>
> Both Encryption and Decryption Algorithms as well as their respective Salt
> length would change at random intervals
> If you are a Math whiz and you developed an algo SSL/TLS encrypt algo
> going up it would not work for the algo coming down ...Each entity's update
> schedule is orthogonal meaning that any entity cannot and should not
> necessarily be able to be derived from another known entity (by
> conventional means)
>
> Moreover since most crypto algos are migrating from symmetric (same algo
> for encryption and decryption) to asymetric (differing algos for encryption
> and decryption) the work you put into creating one non-repudiating algo for
> encrypting does not necessarily dovetail to crack'ing the second algo...
> http://en.wikipedia.org/wiki/Assymetric_key_cryptography
>
> the algos can be and are oftentimes different as seen here
>
> Browser->Algo1->Server
>
> vs
>
> Browser<-Algo2<--Server
>
>
>
> "how bad strust2 vulnerability is"...
>
> last time i checked this is not "strust2" list
>
>
> Regards,
> Martin
> ______________________________________________
>
>
>
>
>
>
> > Date: Wed, 16 Oct 2013 08:21:28 -0400
> > From: ere...@mail.nysed.gov
> > To: user@struts.apache.org
> > Subject: Re: Steps Involved in counter measurement for security issues
> >
> > First of all, security on web applications is of a concern but not as
> > much as one would think.
> >
> > To find all the security vulnerabilities within any application, or
> > framework, one would find all the entry points which allow user
> > provided data. This could be a field, a protocol, etc. and then one
> > would "fuzz" this process until the program crashed.
> >
> > Not only does a hacker need to crash the program, but hacking also
> > requires knowledge by the attacker of the underlying operating system
> > and what version it is. Most web applications run in a virtual
> > environment with proxies between the real server and the user, so just
> > finding out what to attack is hard if the network is properly
> > configured.
> >
> > Certainly something to consider but you will probably never find all
> > the vulnerabilities, it's a much better approach to monitor your
> > network, and know your underlying systems.
> >
> > Even though struts can be hacked, look at all those .jar files you
> > included and run on your server with high level permissions. Those too
> > can be full of exploits and most of those libs are just downloaded from
> > the net by amateur developers.
> >
> > Eric Reed
> > New York State Department of Education
> >
> >
> >
> >
> >
> > >>> Lukasz Lenart <lukaszlen...@apache.org> 10/16/2013 7:12 AM >>>
> > Ok, so the only option is got through each security bulletin and check
> > provided Proof-of-Concept if it affects your application. And DMI
> > isn't a problem if used wise.
> >
> > https://cwiki.apache.org/confluence/display/WW/Security+Bulletins
> >
> > 2013/10/16 Sreekanth S. Nair <sreekanth.n...@egovernments.org>:
> > > Thanks Lukazs, the problem i'm facing now is our product is so huge
> > to do a
> > > migration and running mainly on DMI. I'm unable to convince my top
> > > management about how bad strust2 vulnerability is (since i dont know
> > how to
> > > replicate the vulnerability). So I have no choice other than option
> > 2.
> > >
> > > --
> > > Thanks & Regards
> > > Srikanth
> > > Software Developer
> > > --------------------------------
> > > eGovernments Foundations
> > > www.egovernments.org
> > > Mob : 9980078913
> > > --------------------------------
> > >
> > >
> > > On Wed, Oct 16, 2013 at 4:22 PM, Umesh Awasthi
> > <umeshawas...@gmail.com>wrote:
> > >
> > >> I do not think that is possible.
> > >> You have 2 options
> > >>
> > >> 1. Upgrade you struts2 version.
> > >> 2. Go through security vulnerability and see what was there and
> > create test
> > >> cases to see what exactly is happening and fix them by checking
> > patches.
> > >>
> > >> But IMO, upgrading to latest version is much more flexible and less
> > time
> > >> consuming than going through each and every vulnerability and
> > applying
> > >> fixes for them.
> > >>
> > >>
> > >> On Wed, Oct 16, 2013 at 4:17 PM, Sreekanth S. Nair <
> > >> sreekanth.n...@egovernments.org> wrote:
> > >>
> > >> > Test Case to test the security vulnerability (major ones) in
> > >> > struts2-core-2.1.2.
> > >> >
> > >> > --
> > >> > Thanks & Regards
> > >> > Srikanth
> > >> > Software Developer
> > >> > --------------------------------
> > >> > eGovernments Foundations
> > >> > www.egovernments.org
> > >> > Mob : 9980078913
> > >> > --------------------------------
> > >> >
> > >> >
> > >> > On Wed, Oct 16, 2013 at 4:15 PM, Lukasz Lenart
> > <lukaszlen...@apache.org
> > >> > >wrote:
> > >> >
> > >> > > 2013/10/16 Sreekanth S. Nair <sreekanth.n...@egovernments.org>:
> > >> > > > One more doubt, does this security vulnerability is able to
> > bring
> > >> down
> > >> > > the
> > >> > > > server :-) ? If we authorize ourselves to apache, is it
> > possible for
> > >> > > struts
> > >> > > > team to give us test case to check the vulnerability?
> > >> > >
> > >> > > What you mean by that? What test case you refer to?
> > >> > >
> > >> > >
> > >> > > Regards
> > >> > > --
> > >> > > Ɓukasz
> > >> > > + 48 606 323 122 http://www.lenart.org.pl/
> > >> > >
> > >> > >
> > ---------------------------------------------------------------------
> > >> > > To unsubscribe, e-mail: user-unsubscr...@struts.apache.org
> > >> > > For additional commands, e-mail: user-h...@struts.apache.org
> > >> > >
> > >> > >
> > >> >
> > >>
> > >>
> > >>
> > >> --
> > >> With Regards
> > >> Umesh Awasthi
> > >> http://www.travellingrants.com/
> > >>
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: user-unsubscr...@struts.apache.org
> > For additional commands, e-mail: user-h...@struts.apache.org
> >
> >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: user-unsubscr...@struts.apache.org
> > For additional commands, e-mail: user-h...@struts.apache.org
> >
>
>

Reply via email to