David Ohsie - Distinguished Engineer, EMC Corporation Bill Thompson CISSP, CSSLP - Director IAM Practice, Unicon Aaron Weaver Leveraging OWASP in Open.

Slides:



Advertisements
Similar presentations
Sachin Rawat Crypsis SDL Threat Modeling.
Advertisements

Usage Statistics in Context: related standards and tools Oliver Pesch Chief Strategist, E-Resources EBSCO Information Services Usage Statistics and Publishers:
Central Authentication Service (CAS). What is CAS? JA-SIG Central Authentication Service is an enterprise level, open-source, single sign on solution.
Central Authentication Service Roadmap JA-SIG Winter 2004.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Hands on Demonstration for Testing Security in Web Applications
Engineering Secure Software. Uses of Risk Thus Far  Start with the functionality Use cases  abuse/misuse cases p(exploit), p(vulnerability)  Start.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
What’s New in JA-SIG CAS? JA-SIG Summer Conference Denver, CO June 24 – 27, 2007.
Copyright 2004 Monash University IMS5401 Web-based Systems Development Topic 2: Elements of the Web (g) Interactivity.
UPortal and the Yale Central Authentication Service Drew Mazurek ITS Technology & Planning Yale University JA-SIG Summer Conference ‘04 Denver, CO June.
Week 2 IBS 685. Static Page Architecture The user requests the page by typing a URL in a browser The Browser requests the page from the Web Server The.
UPortal Authentication Options: Design and Application Shawn Bayern Research programmer, Yale University Author, Web Development with JavaServer Pages.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
UPortal Security and CAS Susan Bramhall ITS Technology & Planning Yale University.
1 CS6320 – Why Servlets? L. Grewe 2 What is a Servlet? Servlets are Java programs that can be run dynamically from a Web Server Servlets are Java programs.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Authentication Systems and Single Sign-On (SSO) David Orrell, Eduserv Athens 1st EuroCAMP, 2-4 March 2005, Turin, Italy.
JA-SIG CAS Enterprise Single Sign-On Scott Battaglia Application Developer Enterprise Systems & Services Rutgers, the State University of New Jersey Copyright.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
What is OWASP OWASP Live CD Live Demo Omar Sherin-OWASP Egypt.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
IDENTIFYING SECURITY ISSUES IN A HIGHER INSTITUTE CMS LAB SITE Panagiotis Loumpardias Konstantinos Chimos.
Applets & Servlets.
The Central Authentication Service (CAS) Shawn Bayern Research programmer, Yale University Author, JSTL in Action, Web Development with JavaServer Pages.
A Framework for Automated Web Application Security Evaluation
Penetration Testing James Walden Northern Kentucky University.
A Security Review Process for Existing Software Applications
11/16/2012ISC329 Isabelle Bichindaritz1 Web Database Application Development.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Exercises for Chapter 2: System models
Universiti Utara Malaysia Chapter 3 Introduction to ASP.NET 3.5.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Web Authentication at Iowa Ed Hill Software Developer The University of Iowa.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
A Community of Learning SUNGARD SUMMIT 2007 | sungardsummit.com 1 Extending SSO – CAS in Luminis Presented by: Zachary Tirrell Plymouth State University.
CAS Update Jasig 2011 Marvin Addison Susan Bramhall Andrew Petro Bill Thompson.
CensorNet Ltd An introduction to CensorNet Professional On-premise web filtering & management An introduction to CensorNet Professional On-premise web.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
AppSec USA 2014 Denver, Colorado CMS Hacking 101 Hacking and Securing Popular Open Source Content Management Systems.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
CAS Scott Battaglia Rutgers, the State University of New Jersey.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
JS (Java Servlets). Internet evolution [1] The internet Internet started of as a static content dispersal and delivery mechanism, where files residing.
Security Issues with PHP  PHP installation  PHP programming Willa Zhu & Eugene Burger.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Securing Angular Apps Brian Noyes
What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling  OCTAVE Risk/Threat.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Java Programming: Advanced Topics 1 Building Web Applications Chapter 13.
Introducing the Central Authentication Service (CAS) Shawn Bayern Research programmer, ITS Technology & Planning Author, Web Development with JavaServer.
Ken De Souza KWSQA, April 2016 V. 1.0
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Website Update and Use of Official accounts Dr.Lasantha Ranwala ( MBBS,MSc-Biomedical Informatics) Medical Officer - Health Informatics RDHS Office.
Introduction to Internet Programming (Web Based Application)
Manuel Brugnoli, Elisa Heymann UAB
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Web Development Web Servers.
A Security Review Process for Existing Software Applications
Benefits To Used PHP To Create Websites. PHP – Hypertext Transfer Protocol PHP consider the most famed programming language for developing websites or.
PHP / MySQL Introduction
Web App vs Mobile App.
Mike Goodwin OWASP Newcastle September 2017
Introduction to Servlets
Central Authentication Service
Presentation transcript:

David Ohsie - Distinguished Engineer, EMC Corporation Bill Thompson CISSP, CSSLP - Director IAM Practice, Unicon Aaron Weaver Leveraging OWASP in Open Source Projects - CAS AppSec Working Group

Hosted by OWASP & the NYC Chapter

Central Authentication Service (CAS) Simple, Flexible, Extensible Open Source Web Single Sign-On for the Enterprise ●Alfresco ●Confluence ●DokuWiki ●Drupal ●Google Apps ●JIRA ●Joomla! ●Liferay ●MediaWiki ●Moodle ●OpenCMS ●PeopleAdmin ●Roller ●Sakai ●Twiki ●uPortal ●Wordpress ●Zimbra ●Spring Security ●Apache Shiro ●Java CAS Client ●.Net CAS Client ●php CAS Client ●mod_auth_cas ●ASP to Zope

Hosted by OWASP & the NYC Chapter Central Authentication Service (CAS) ●CAS initially create by Shawn Bayern in 2001 at Yale ●CAS3 jointly designed and developed by Rutgers and Yale in 2005 as Jasig project ●Simple protocol, flexible architecture, wide deployment

Hosted by OWASP & the NYC Chapter Central Authentication Service (CAS) But...is it secure? How do we know? ●Based on Kerberos ●Wide deployment and many eye balls ●Reports of dynamic scans from time to time ●Maybe we should really check?

Hosted by OWASP & the NYC Chapter Central Authentication Service (CAS) CAS AppSec Working Group - Jan 2013 Joachim Fritschi Jérôme Leleu Misagh Moayyed Parker Neff David Ohsie Andrew Petro Bill Thompson Aaron Weaver

●Proactively work to improve the security posture ●Respond to potential vulnerabilities ●Produce artifacts that help potential CAS adopters evaluate the security of CAS ●Create and maintain recommendations on good security practices for deployments Hosted by OWASP & the NYC Chapter CAS AppSec Working Group Goals

Hosted by OWASP & the NYC Chapter

Google pays coders to improve open-source security

Hosted by OWASP & the NYC Chapter Open Source software needs to be open on software security.

Hosted by OWASP & the NYC Chapter As an adopter or potential adopter I want to know how the project deals with security

Hosted by OWASP & the NYC Chapter Security can be a strong “selling” point!

Hosted by OWASP & the NYC Chapter How to avoid being one of the "73%" of WordPress sites vulnerable to attack Or it can detract from your project

Hosted by OWASP & the NYC Chapter Vulnerability Handling Practices

Hosted by OWASP & the NYC Chapter

OSS AppSec Program ●Form a working group ●OWASP Resources ●Meet regularly ●Make it easy to report vulnerabilities ●Threat Analysis with Developers ●Run security tools (ZAP, Static Code)

Hosted by OWASP & the NYC Chapter Contributors ●Use OWASP Resources and Libraries ●Threat Model ●Work with security researchers

Hosted by OWASP & the NYC Chapter Make it easy to report a vulnerability ●Security issue address ●Provide a PGP Key

Hosted by OWASP & the NYC Chapter Static Code Analysis Issues were found, prioritized and worked through false positives

●What people think/say: “We probably don’t have any major security issues.” ●Threat analysis gives you a way to systematically analyze the possible threats against your system and rank them by potential impact. ●Threat analysis also gives adopters the information they need to analyze the deployment of your system in their environment. Hosted by OWASP & the NYC Chapter Threat analysis: Purpose

●Decompose the application: Draw a dataflow diagram in order to enumerate the attack surfaces. ●For each attack surface, enumerate the threats to the system and rank them. ●For each threat, create a list of possible mitigations. ●More details: odeling odeling Hosted by OWASP & the NYC Chapter Threat analysis: Methodology

●Started with whiteboarding session at Apereo conference to produce initial DFD and threats ●Biweekly follow-up meeting via Webex ●Used STRIDE to help identify threats ●Results maintained on wiki page ● ghttps://wiki.jasig.org/display/CAS/CAS+Threat+Modelin g Hosted by OWASP & the NYC Chapter CAS Appsec Experience

Hosted by OWASP & the NYC Chapter CAS Context DFD

Hosted by OWASP & the NYC Chapter CAS Protocol DFD Browser CAS Server CAS Client (Agent) Application Username/Password + Application Service URL SSO Session Cookie (TGT) Application Service Ticket (ST) HTTP(S) Request + ST HTTP(S) + Optional Session Cookie HTTPS

Hosted by OWASP & the NYC Chapter STRIDE ThreatSecurity Control SpoofingAuthentication TamperingIntegrity RepudiationNon-Repudiation Information DisclosureConfidentiality Denial of ServiceAvailability Elevation of PrivelegeAuthorization

●Identifier: PC_3 ●Category: Information Disclosure ●Threat: The pgtIou and pgtId are send as GET parameters, which can be a problem as they might be stored in logs or indexed in internal search engines... ●Mitigation: Never log the GET parameters on the proxy callback url. Though, it might be not sufficient. Should we change the CAS protocol in the next revision (v4.0) to POST these parameters ? Hosted by OWASP & the NYC Chapter CAS Appsec Sample Threat

●Easy: Security Guide Contents ○Disable http ○How to write a safe CAS client/plugin ○Securing the ticket registry ●Harder: Change the code ○Secure-by-default ○Encrypted/signed ticket registry Hosted by OWASP & the NYC Chapter Classifying Remediation

●Classified 19 threat against the system ●Generated 10 proposals ●One proposal (secure-by-default) integrated into CAS 4.0 ●Paraphrase from a CAS committer: ○“I thought when we started that we would not find any problems, but now I see that there are lots of improvements to be made” Hosted by OWASP & the NYC Chapter CAS Threat modeling results

●Even in a security project, features are favored over security! ●Difficult to get consistent participation (although a core of contributors have kept it up; thank you, Jérôme Leleu and co-presenters!) ●Difficult to get changes prioritized and into the project Hosted by OWASP & the NYC Chapter Challenges

Hosted by OWASP & the NYC Chapter Application Security Professionals Find an open source project and volunteer!

Hosted by OWASP & the NYC Chapter Thanks! David Ohsie Bill Thompson, CISSP, CSSLP IAM Practice Director, Unicon Aaron Weaver