security

Why is Kerberos programming so frustratingly difficult?

I have implemented an application a few years ago using both kerberos functions and GSSAPI to authenticate to a kerberos server but when I look back at the code, it always took time to understand what those calls do (I think I need to put comments on my comments). What is the best way to understand how kerberos works and how to effecti...

Gmail security architecture

Hello, I am trying to understand gmail's authentication mechanism. I know it uses https for transporting the user credentials during login and then the rest of the communication happens over http. How is this achieved? Is some kind of key exchanged during the initial session over https and used in subsequent requests? if yes, Isn't some...

Ways to insert javascript into URL?

Duplicate of: What common web exploits should I know about? This is a security question. What should I look for in URL that prevents hacking? Is there a way to execute javascript by passing it inside a URL? As you can see I'm pretty new to this concept. Any good posts on this stuff? ...

What should you check for in HTML form text fields?

I'm writing a PHP script to grab text box data from a submitted form. These are simple text boxes and I don't want to accept any HTML tags. I think I should at least use strip_tags() and addslashes(). Anything else? I wouldn't mind restricting the input to alphanumerics, should I use a regular expression to seek out nonstandard characte...

How to login to Hudson with a certificate

I'm trying to setup Hudson in an environment where all the users use certificates. I looked around the archives here, on nabble, and on google, but if this is documented somewhere, i think I'm missing it. I'm sure part of the answer to this will be related to Hudson, and some will be specific to my servlet container. Under Security, I...

Any good security encoding libraries for .NET out there ?

Hi all.. Been reading up on various injection-type attacks, and it seems like the best way to get rid of these vulnurabilities is to encode all user input to remove / replace some characters with others (< > ; etc). What's my best bet here? Are there any nice libraries out there to aid me with this? Or something that could help me spot...

What methods can be used to secure web services?

I'm interested to know what methods people use to secure their webservices from unauthorized web service consumers. ...

How would you attack a domain to look for "unknown" resources?

Given a domain, is it possible for an attacker to discover one or many of the pages/resources that exist under that domain? And what could an attacker do/use to discover resources in a domain? I have never seen the issue addressed in any security material (because it's a solved problem?) so I'm interested in ideas, theories, best-guess...

What is the main purpose of openssl's SSL_CTX_use_certificate_file?

The man page did not clearly specify this. But looking at openssl's apps implementations, SSL_CTX_use_PrivateKey* calls are usually made after SSL_CTX_use_certificate_file succeeded. I assume this is mostly used at the server side. I recently confused the above function with SSL_CTX_load_verify_locations wherein you could specify a CA c...

Security review: client credit card# stored on server but with one time pad encryption stored in client cookie.

I'm writing a system where, as usual, the client is asking for a convenience "remember your credit card details" option. I've told them that this is in all likelihood a no-go. However, I did have a good idea (tm) just now, and seeing that Good Ideas in Encryption(tm) are actually Bad Ideas (tm), I thought I'd put it up for review here a...

How can I check for SSL vulnerabilities on my web server?

Is there an easy way or online tool for checking a site's SSL vulnerability issues? From the PCI standards I see that a site has to force SSLv3 or TLSv1 protocols and high security encryption algorithms. And I need to check if my site is compliant with those PCI DSS standards. ...

Secure cookies and mixed https/http site usage.

Lots of sites appear to support https but don't use secure cookies. I want to make my site use secure cookies but to allow for some content to be accessed using http instead. A sensible way to do this appears to be to have a secure cookie for the real session, and a non-secure cookie which is just a flag to say if the user is logged in...

MediaWiki documentation with external user access control

We are using MediaWiki inhouse for our software and hardware documentation. It looks like granting / revoking "read access" to parts of the documentation for our external users - customers, project partners - is not easy to achieve. How could we control read access to some areas of the documentation based on user or role access rights? ...

How can I generate a client proxy for a WCF service with an HTTPS endpoint?

Might be the same issue as this previuos question: WCF Proxy but not sure... I have an HTTPS service connfigured to use transport security and, I hope, Windows credentials. The service is only accessed internally (i.e. within the intranet). The configuration is as follows: <configuration> <system.serviceModel> <services> ...

Apache: how to limit virtual dir to local network

On my Apache 2.x server at home, I have a number of virtual directories. I've set up my router so that I can access Apache from the internet. I need to keep one of those virtual dirs (/private) from being accessed outside my home network LAN. So given /private, how do I configure Apache to only serve requests to /private from 192.168...

Lock someone to a particular domain

Hello, We have a dll that is a plug-in for a asp.net shopping cart software that customers can purchase. However, we want to lock that dll to a particular domain for security reasons and we don't want them to be able to read that dll or use that dll in another domain they may have. How can we do this? ...

Why should checking a wrong password take longer than checking the right one?

This question has always troubled me. On Linux, when asked for a password, if your input is the correct one, it checks right away, with almost no delay. But, on the other hand, if you type the wrong password, it takes longer to check. Why is that? I observed this in all Linux distributions I've ever tried. ...

Best way to secure data PHP + MYSQL

I'm building an app that will store some of our clients details, things like usernames / passwords, information that we need to remember and keep secure. What's the best method for storing this information securely? ...

AJAX and asp.net security question

Hello. I have a couple of questions regarding security mechanisms in asp.net (2.0). I have always been using Forms authentication + Page.User for validating permissions. Now I need to send some data from client side javaScript (jQuery) to a WCF service. Will my IPrincipal be still accessible from HttpContext of WCF service (I'm hosti...

Should a web server's firewall block outbound HTTP traffic over port 80?

I understand the need for putting a web server in a DMZ and blocking inbound traffic to all ports except 80 and 443. I can also see why you should probably also block most outbound traffic in case the server is compromised. But is it necessary to block outbound HTTP traffic over port 80? If so, why? A lot of web applications these days ...