11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 19: Securing Your ASP.NET <strong>Application</strong> <strong>and</strong> <strong>Web</strong> Services 573RemotingDo not expose .NET Remoting endpoints on Internet-facing <strong>Web</strong> servers. To disableRemoting, disable requests for .rem <strong>and</strong> .soap extensions by mapping requests forthese file extensions to the HttpForbiddenH<strong>and</strong>ler. Use the following elementsbeneath :. . .Note This does not prevent a <strong>Web</strong> application on the <strong>Web</strong> server from connecting to a downstreamobject by using the Remoting infrastructure. However, it prevents clients from being able to connectto objects on the <strong>Web</strong> server.<strong>Web</strong> ServicesConfigure <strong>Web</strong> services using the element. To establish a secure <strong>Web</strong>services configuration:● Disable <strong>Web</strong> services if they are not required● Disable unused protocols● Disable the automatic generation of WSDLDisable <strong>Web</strong> Services if They Are Not RequiredIf you do not use <strong>Web</strong> services, disable them by mapping requests for the .asmx(<strong>Web</strong> service) file extension to HttpForbiddenH<strong>and</strong>ler in Machine.config as follows:. . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!