[Tickets #8423] H4 Security Audit

bugs at horde.org bugs at horde.org
Fri Jul 10 02:57:07 UTC 2009


DO NOT REPLY TO THIS MESSAGE. THIS EMAIL ADDRESS IS NOT MONITORED.

Ticket URL: http://bugs.horde.org/ticket/8423
------------------------------------------------------------------------------
  Ticket             | 8423
  Created By         | Chuck Hagenbuch <chuck at horde.org>
  Summary            | H4 Security Audit
  Queue              | Horde Base
  Version            | HEAD
  Type               | Enhancement
  State              | Assigned
  Priority           | 2. Medium
  Milestone          | 4.0
  Patch              |
  Owners             | Horde Developers, Chuck Hagenbuch
------------------------------------------------------------------------------


Chuck Hagenbuch <chuck at horde.org> (2009-07-09 22:57) wrote:

deprecate blatantly insecure auth schemes; make sure to use a salted  
auth scheme by default

need a hook or setting to limit # of unsuccessful login attempts to horde

need a hook or setting to limit easily guessable passwords

require re-authentication before changing passwords, or other  
sensitive operations

don't use the same secret key for multiple purposes
allow key rotation

reference:
http://cookies.lcs.mit.edu/
http://pdos.csail.mit.edu/papers/webauth:sec10.pdf

make sure cookies are set with the secure flag when ssl is used

get rid of URL-based sessions entirely

limit the lifetime of even session-based cookies

authenticator cookie:
exp=t&data=s&digest=MAC(xp=t&data=s)
- push the username and some other basic info (browser string, ip, ...  
?) into the data parameter ("s"), to avoid having to init the session  
on most page loads

- store other session data by key in a backend, accessed on-demand and  
saved only when dirty? what about commonly used info like prefs? cache  
with username in the key in the cache backend instead?






More information about the bugs mailing list