Putting in a review is not an action?

Picking items from the gold box is not an action?

----- Original Message -----
From: Barney Boisvert <[EMAIL PROTECTED]>
Date: Tuesday, March 23, 2004 3:02 pm
Subject: RE: Securing CF Apps.

> But the point is that you're still browsing content, you're not
> performingany actions.  At least in my mind, that's really what
> differentiates a site
> from an application.  Amazon is definitely very complex, but it's
> still a
> web site in my book, at least until you get to the checkout phase.
>
> Cheers,
> barneyb
>
> > -----Original Message-----
> > From: Kwang Suh [EMAIL PROTECTED]
> > Sent: Tuesday, March 23, 2004 1:31 PM
> > To: CF-Talk
> > Subject: RE: Securing CF Apps.
> >
> > How about the wish lists, recommendations, gold box, trivia,
> > product ratings, product reviews, etc?
> >
> > I'd say that's an application.  Just because I don't have to
> > go through some authentication process doesn't mean I'm
> > browsing a site.
> >
> > ----- Original Message -----
> > From: Barney Boisvert <[EMAIL PROTECTED]>
> > Date: Tuesday, March 23, 2004 2:05 pm
> > Subject: RE: RE: RE: Securing CF Apps.
> >
> > > Amazon.com is primarily a web site, the backend where the
> staff
> > > manageseverything is an application.  Web sites let anonymous
> > > users browse content,
> > > while web applications let authenticated users perform actions
> > > that affect
> > > other users/visitors.
> > >
> > > The only part of amazon.com that is an application (of the
> stuff
> > > you can
> > > see) is the checkout process, and you can't bookmark one of
> those
> > > pages.Well, you can, but when you come back, you'll get a
> message
> > > that says "you
> > > need to start over" or something like that, with a link back
> to
> > > the web site
> > > portion.
> > >
> > > Cheers,
> > > barneyb
> > >
> > > > -----Original Message-----
> > > > From: Kwang Suh [EMAIL PROTECTED]
> > > > Sent: Tuesday, March 23, 2004 12:51 PM
> > > > To: CF-Talk
> > > > Subject: Re: RE: RE: Securing CF Apps.
> > > >
> > > > I'd say something like Amazon.com is an application, and
> boy,
> > > > would I ever hate it if I couldn't bookmark a link to a
> book.
> > > >  Or their wish lists.  That's not a site.
> > > >
> > > > Some parts of an "application" can be public facing, you know.
> > > >
> > > > How about Web Services?  Are those an application?  Well, I
> > > > can sure tell you they're not a site.  Should I be
> > > > obfuscating those links too?  That sure would suck.
> > > >
> > > > ----- Original Message -----
> > > > From: Adrocknaphobia <[EMAIL PROTECTED]>
> > > > Date: Tuesday, March 23, 2004 1:43 pm
> > > > Subject: Re:  RE: RE: Securing CF Apps.
> > > >
> > > > > You do realize we are talking about applications and not
> > > websites.
> > > > > There is a big difference, and I've never once found it a
> good
> > > > > idea for a user to bookmark a part of application.
> > > > >
> > > > > -adam
> > > > >
> > > > >
> > > > > > -----Original Message-----
> > > > > > From: Kwang Suh [EMAIL PROTECTED]
> > > > > > Sent: Tuesday, March 23, 2004 07:55 PM
> > > > > > To: 'CF-Talk'
> > > > > > Subject: Re: RE: RE: Securing CF Apps.
> > > > > >
> > > > > > > If my user.login is encrypted one time as kjdfljsldfl  
> and
> > > the
> > > > > > > user comes
> > > > > > > back and types in kjdfljsldfl they don't get taken to
> that
> > > > > > > circuit, because
> > > > > > > it's different this time.
> > > > > >
> > > > > > This would not be acceptable in many situations, because
> it
> > > > > prevents bookmarking and renders search engines useless.
> > > > > >
> > > > > > > >> 3. The objection to using cfquery is multifaceted.  
> > > There
> > > > > is
> > > > > > > the
> > > > > > > >> risk of SQL
> > > > > > > >> injection if your not doing the correct validation.
> If
> > > > > your
> > > > > > > >> errors are not
> > > > > > > >> being handled correctly you can give away table and
> > > column
> > > > > > > names
> > > > > > > >> in the
> > > > > > > >> error message.
> > > > > > >
> > > > > > > >So don't you think it's more important to handle
> errors
> > > > > properly
> > > > > > > than say
> > > > > > > "don't ever use <cfquery>"?
> > > > > > >
> > > > > > > I think that with all the benefits of procedures, if
> > > > you have them
> > > > > > > available, you're a fool not to use them, and not just
> > > because
> > > > > of the
> > > > > > > enhanced security.  Obviously proper error handling is
> > > > > important
> > > > > > > AS WELL.
> > > > > > > This is not an either/or argument, rather a
> > complimentary one.
> > > > > >
> > > > > > What's wrong with:
> > > > > >
> > > > > > <cfquery>
> > > > > > exec my_stored_proc
> > > > > > </cfquery>
> > > > > >
> > > > > > ?
> > > > > >
> > > > > >
> > > > > > > >> 2. By using plain text variable names your going to
> > > give
> > > > > the
> > > > > > > potential>> intruder a decent insight into your
> > > application
> > > > > > > design, and this
> > > > > > > >> will give
> > > > > > > >> them the ability to make educated guesses as to
> your
> > > other
> > > > > > > circuit
> > > > > > > >> names.
> > > > > > >
> > > > > > > >So?
> > > > > > >
> > > > > > > So by understanding the structure of an application,
> you
> > > can
> > > > > then
> > > > > > > begin to
> > > > > > > analyze it's weaknesses.  In the environment in which
> I
> > > work
> > > > > we
> > > > > > > want to give
> > > > > > > them as little as possible to go on.
> > > > > > >
> > > > > > > >You've got bigger problems should someone gain access
> to
> > > your
> > > > > > > file system.
> > > > > > >
> > > > > > > Is that so??  I disagree.  If someone gains access to
> my
> > > web
> > > > > > > server they
> > > > > > > have nothing.  Now my db which is on the other side of
> a
> > > > > firewall,
> > > > > > > and only
> > > > > > > accepts connections from specific ips, if they got in
> that
> > > it
> > > > > > > could become
> > > > > > > problematic.  Why?  Because there are no user names or
> > > > > passwords
> > > > > > > stored on
> > > > > > > my web server.  There is no way to open a direct
> > > connection
> > > > > into
> > > > > > > my db
> > > > > > > without having a user account on the db.  Your rights
> and
> > > > > roles
> > > > > > > are also
> > > > > > > stored in that db, not in the application, and so you
> > > would
> > > > > not
> > > > > > > really get
> > > > > > > anything other than images and source code.  You don't
> > > even
> > > > > get
> > > > > > > the code of
> > > > > > > the procedure calls, and so you are still blind to the
> > > schema
> > > > > of
> > > > > > > my db.
> > > > > >
> > > > > > If I have complete access to your file system, this
> means
> > > that I
> > > > > can, say, create a file that monitors tcp/ip traffic
> between
> > > your
> > > > > web server and db server and sends the packets over to me
> > > where I
> > > > > can then scan for your password.  Or I could simply delete
> > > > > everything on the web server.
> > > > > >
> > > > > > >
> > > > > > > Kwang, again, this is a layered approach to security.  
> No
> > > one
> > > > > > > thing is going
> > > > > > > to protect you from everything.  You just continue to
> lock
> > > > > down
> > > > > > > things in
> > > > > > > order to mitigate risk.  You can never be without
> risk,
> > > and
> > > > > anyone who
> > > > > > > thinks they have completely secured their site
> deserves to
> > > be
> > > > > > > attacked.Listen man.  You do whatever you feel
> comfortable
> > > > > doing.  
> > > > > > > No more, no less.
> > > > > > > But moving towards my CISSP and GSEC, having been a
> cyber
> > > > > threat
> > > > > > > analyst for
> > > > > > > the last two years, and soon to be managing a federal
> > > CERT, I
> > > > > can
> > > > > > > tell you
> > > > > > > this, there is always going to be some new exploit.
> It's
> > > going
> > > > > to be
> > > > > > > something you didn't think of.  But that zero day
> exploit
> > > > > isn't
> > > > > > > going to be
> > > > > > > the one that does all the crazy damage.  It's going to
> be
> > > some
> > > > > known> > vulnerability that you could have prevented from
> > > putting
> > > > > your
> > > > > > > system at
> > > > > > > risk. (slammer, blaster etc.)  By duplication of your
> > > > efforts, by
> > > > > > > overlapping your protection you're trying to create a
> > > shell
> > > > > around
> > > > > > > yourapplication and it's data.
> > > > > >
> > > > > > If what you're building is that important to secure, I
> > > recommend
> > > > > that you never ever make it available on the public internet.
> > > > > >
> > > > > > Obscurity is just one more tool
> > > > > > > you can use to
> > > > > > > do that.
> > > > > >
> > > > > > I used to work with a security/cryptology expert.  
> > His #1 rule:
> > > > > >
> > > > > > "Never, ever use obfuscation".
> > > > > >
> > > > > >
> > > > > >
> > > > > >
> > > > > >
> > > > >
> > > > >
> > > >
> > > >
> > >
> > >
> >
> >
>
>
[Todays Threads] [This Message] [Subscription] [Fast Unsubscribe] [User Settings]

Reply via email to