security

Web authentication state - Session vs Cookie vs ?

What's the best way to authenticate and track user authentication state from page to page? Some say session state, some say cookies? Could I just use a session variable that has the ID of the user and upon authentication, instatiate a custom User class that has the User's information. Then, on every page, verify the session variable is...

how to protect the ws discovery ad hoc network from man-in-the-middle attacks

the ws-discovery specifications explains how to protect your network from message alteration Denial of service replay spoofing but what about man-in-the-middle attack? ...

Symfony Action Security - How to forward after successful authentication?

With Symfony's Action Security if a user has not been identified he will be forwarded to the default login action as defined in the applications settings.yml file. How would I forward the user to the originally requested action after the user is successfully authenticated? ...

How can I pass user credentials through a Unix-domain socket on Mac OS X?

Under many operating systems Unix-domain sockets allow a process to reliably pass its credentials to another process in a way that can't be maliciously subverted. For instance, this is done on Linux through the SO_PASSCRED and SO_PEERCRED options, on FreeBSD by passing messages that include the cmsgcred structure, and on NetBSD by setti...

Git repository with multiple users on Ubuntu

I have an existing bare git repository located in /home/myaccount/git/project. I am currently using it over ssh from my local machine without any problems. I want to add a second user on the server which only shall access to this git repository (maybe move the repo outside my account folder?). How? Using latest version of git and ubuntu ...

Unit testing with Spring Security

My company has been evaluating Spring MVC to determine if we should use it in one of our next projects. So far I love what I've seen, and right now I'm taking a look at the Spring Security module to determine if it's something we can/should use. Our security requirements are pretty basic; a user just needs to be able to provide a usern...

Using a web service to secure a database.

There are some rumors floating around that the team at my company will soon be using web services for all future application development. The architecture is supposed to be something like this: Application --> Web Service --> Database The stated reasoning behind it is security. This sounds like a huge waste of time for little if any ...

Web application to use window domain accounts for authentication

Hi, If you have a web application that will run inside a network, it makes sense for it to support windows authentication (active directory?). Would it make sense to use AD security model as well, or would I make my own roles/security module that some admin would have to configure for each user? I've never dealt with windows security...

How do I mix Integrated Security and own userdatabase with IIS/C# 3.5?

Is it possible to mix all these access controls in one site? I have a requirement saying a) Users from the AD must be allowed access, using integrated security b) Users from some other AD must be allowed access; potentially by logging in c) Users not in the AD's should be able to create a new account on the site. Now, ofcourse, ...

Is it possible to retrieve username, password and roles from a database instead of retrieving them from tomcat-user.xml while using container-managed security

I have a web application which i deploy in Tomcat. I want to secure all pages under the url path administration/*. I have set up container-managed security entering the next snippet in the web.xml file: <security-role> <role-name>administrator</role-name> </security-role> <login-config> <auth-method>BASIC</auth-method> ...

Authentication for a browser-based application dependent on the client machine

How do you make the authentication for a browser-based application dependent on the client machine? Say the admin can login only from this machine. Assumptions: There is complete control over the network and all machines (client and server) involved. I am looking for an apache/linux solution. ...

How can we protect the vulnerable online?

Recently the company I work for was asked to pitch for creation of a forum targetted at children as part of a website solution. I think that at least we should reccommend Human moderation by a trained individual to protect these kids Code alarm / suspicious analysis into the forum How has anyone else tackled this and what Ideas do o...

Where can I find a deliberately insecure open source web application?

As a developer, I've learned that I usually gain a better understanding of best/worst practices through experience. The area of web application security isn't really somewhere where my organization can afford to let developers learn through trial and error. So looking for a hands-on approach to knowledge sharing of best practices in ...

Network Security

I have been a .net developer for the past three yrs. Just curious to know about the network security field. What kind of work does the developers working in these area do? I really have not much idea about network security but what my understanding is these people are involved in securing network, preventing attacks on network as obviou...

Is it safe to run a pool under NT AUTHORITY\NETWORK SERVICE?

I normally would create a limited rights user and run the process under that but the fact that pools automatically created under IIS7 in 2008 use this account makes me think that this is perfectly safe, and possibly more so than something I create? The whole Secure By Default push from Redmond would lead me to believe this is the case. ...

In Java: How to handshake a secured connection using Keystore and Truststore certificate?

If I have 2 terminals A and B. T-A is connect T-B over secured socket connection. I need to write code to implement a connection between the 2 terminals. How do I do handshake such connection using Keystore and Truststore. Another word, where do I place keystore/truststore certificate file? (T-A or T-B) Any good advice or good example ...

Securing certain parts of an application.

Hi, If someone logs on to my application this user contains a dictionary with certain permissions. ex: module.view.workspace = true module.view.reporting = false ... Then we know to what parts of the application the user has access. What I want to know is how we can apply these permissions on the view. We are working in an AS...

Securing MBeans operations

I've got some MBean operations that I need to secure. I would like the users to be required to log in as the server admin and I would like this to be setup programmaticly or, preferably by a config file in the WAR, when the app is deployed. I want to avoid requiring the admin to set this up as a deployment step. We're running glassfish...

Can strong naming an assembly be used to verify the assembly author?

After reading the proper article in MSDN and related stackoverflow.com questions here, I finally return to the community. To which extent can a strong-named assembly be verified to avoid tampering? Is it possible to use strong-naming to verify an assembly author? The first question arises after reading this CSharp411 article, which ...

How to effectively authenticate the user calling a webservice?

Hi, In a multi-server environment, users will be able to use a page to put, update or delete files on the servers. I was considering using a webservice (on each server) called by the IIS thread to do that work (with an aspx management page). However, for obvious reasons, I don't really want anyone to be able to call that webservice (by...