11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

82 Part II: Designing Secure <strong>Web</strong> <strong>Application</strong>sBe Able to Disable AccountsIf the system is compromised, being able to deliberately invalidate credentials ordisable accounts can prevent additional attacks.Do Not Store Passwords in User StoresIf you must verify passwords, it is not necessary to actually store the passwords.Instead, store a one way hash value <strong>and</strong> then re-compute the hash using the usersuppliedpasswords. To mitigate the threat of dictionary attacks against the userstore, use strong passwords <strong>and</strong> incorporate a r<strong>and</strong>om salt value with the password.Require Strong PasswordsDo not make it easy for attackers to crack passwords. There are many guidelinesavailable, but a general practice is to require a minimum of eight characters <strong>and</strong> amixture of uppercase <strong>and</strong> lowercase characters, numbers, <strong>and</strong> special characters.Whether you are using the platform to enforce these for you, or you are developingyour own validation, this step is necessary to counter brute-force attacks where anattacker tries to crack a password through systematic trial <strong>and</strong> error. Use regularexpressions to help with strong password validation.For examples of regular expressions to aid password validation, see “InputValidation” in Chapter 10, “Building Secure ASP.NET Pages <strong>and</strong> Controls.”Do Not Send Passwords Over the Wire in PlaintextPlaintext passwords sent over a network are vulnerable to eavesdropping. To addressthis threat, secure the communication channel, for example, by using SSL to encryptthe traffic.Protect Authentication CookiesA stolen authentication cookie is a stolen logon. Protect authentication tickets usingencryption <strong>and</strong> secure communication channels. Also limit the time interval in whichan authentication ticket remains valid, to counter the spoofing threat that can resultfrom replay attacks, where an attacker captures the cookie <strong>and</strong> uses it to gain illicitaccess to your site. Reducing the cookie timeout does not prevent replay attacks but itdoes limit the amount of time the attacker has to access the site using the stolencookie.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!