When you meet him why don't you give him a TSL private key+signed cert
on a USB key?
Then you will allow access only if cert is properly signed.  the
private key can be protected by a secret.
It is easier to do than it seems at first :-)

mic

2010/10/10 mdipierro <[email protected]>:
> adding the three attempt limit is a good idea.
>
> On Oct 9, 10:56 pm, Magnitus <[email protected]> wrote:
>> Well, technically, you can't access the admin unless:
>>
>> 1) You have local access
>>
>> and/or
>>
>> 2) You are using TLS
>>
>> So if you site isn't using TLS, the admin is disabled and you are safe
>> (even if your generic users aren't).
>>
>> However, I dislike the amount of power you have in one place with the
>> admin app.
>>
>> I'd prefer to break it down into several sections that I need and make
>> various sections available to different roles with user accounts.
>>
>> In particular, I find the ability to edit the controllers/models
>> remotely seldom useful in a deployment server (what I'd want to do if
>> I need to modify code after deployment is to modify a secondary test
>> server, test the mods and then propagate the modified files to the
>> production server) and extremely compromising if someone breaks in
>> (yes, in a perfect world, nobody should be able to login as the admin
>> except the admin and so it doesn't matter if all hell breaks lose if
>> someone manages to do so right?).
>>
>> For that reason, I don't include the admin in the list of accessible
>> urls in the routing file.
>>
>> I think disabling the admin after 3 consecutive unsuccessful login
>> attempts wouldn't be that hard to implement, but as I don't use the
>> admin for reasons mentioned above, I think it would be more
>> interesting to disable user accounts after 3 unsuccessful login
>> attempts (assuming that administration is based on role-based access
>> with user accounts).
>>
>> Then, whether its good to implement the 'disable after 3 login
>> attempts' measure depends on the situation.
>>
>> If secret usernames are used to login, its a decent security measure.
>>
>> If emails or public usernames are used to login, it would be easy for
>> someone to do a DoS attack on a particular user they don't like by
>> repeatedly try to login as the user using a wrong password to lockdown
>> his account (lets face it, some people are just mean). For this
>> reason, I also think it might be bad to implement it on the admin app
>> if you are using it (once someone has found the app, they could
>> perform DoS attacks on the admin with impunity).
>>
>> So assuming that the admin section uses role-based access with an
>> account that doesn't have a public username and that the username is
>> something a little more subtle than 'admin', then it wouldn't be a bad
>> thing to implement the 'disable after 3 login attempts' measure.
>>
>> Another interesting alternative to prevent brute force attacks, at
>> least for the admin (might annoy regular users), would be the use of
>> captchas.
>>
>> On Oct 9, 10:39 pm, Richard <[email protected]> wrote:
>>
>> > > 3) I'd also limit the IP access to the artist's home IP, but his IP
>>
>> > will probably be dynamic. Maybe limit the area, I'll see.
>>
>> > I've got some apps around the web with the admin exposed and haven't
>> > had any problems. Though it probably helps that nothing links to them.
>>
>> > Could you modify admin so that it locks the account after a number of
>> > successive password failures?
>>
>> > On Oct 7, 6:44 pm, Magnitus <[email protected]> wrote:
>>
>> > > I am in the process of securing the help of an artist for my project,
>> > > but he's a casual computer user (doesn't know ssh/scp) and I'm trying
>> > > very hard to make everything as painless and pleasant as possible for
>> > > him to secure his help.
>>
>> > > In order to do that, I decided to create a view that will allow the
>> > > artist to download and upload pictures in the "static" folder of my
>> > > app (similar in concept to the facility provided to translators for
>> > > the languages, except with more fine-grained access control).
>>
>> > > Question 1:
>>
>> > > My current strategy (security-wise) is:
>>
>> > > 1) Limit the associated controller to the artist's role
>>
>> > > 1 a) A strong and unchangeable password will be provided to the artist
>> > > (in a face-to-face meeting).
>>
>> > > 1 b) Everything will go through TLS.
>>
>> > > 2) Limit downloads/uploads to .png/.gif/.jpg files (main pitfall if
>> > > part (1) fails: not sure what would happen if a malicious user
>> > > uploaded a malicious script/binary as an image... my guess is not much
>> > > except for a very weird-looking picture for the users... possible
>> > > webside defiguration there as well).
>>
>> > > 3) I'd also limit the IP access to the artist's home IP, but his IP
>> > > will probably be dynamic. Maybe limit the area, I'll see.
>>
>> > > 4) The artistis account will be deleted once the work is done.
>>
>> > > Any blatant oversight or possible improvement to this model?
>>
>> > > Question 2:
>>
>> > > The pictures in the static folder are constantly being read-accessed
>> > > during web-page requests.
>>
>> > > My guessing is that not much will happen if the artist downloads an
>> > > image.
>>
>> > > However, any possible complications if the artist uploads (and thus
>> > > overwrites) one of the pictures while a page needing it is requested?
>>
>> > > Thanks in advance for the feedback.
>>
>>

Reply via email to