ASP and LiveWire Applications

 ASP and LiveWire Applications

 

Although ASP and Livewire applications provide the same capabilities as CGI programs , they are far less prone to security vulnerabilities. There are a number of reasons why these applications are inherently more secure:

 

]They  automatically parse data that is passed to applications and make it available in an easy to use manner. This reduces the likelihood of a flaw occuring in the input parsing functions.

]Their applications have predefined objects at their disposal, which reduce the complexities of maintaining client information, sharing data between clients and sharing data between applications. By making it easier to perform common server side functions , ASP and Livewire help you to develop more reliable and error free code, thereby lowering the likelihood of an exploitable security flaw.

]LiveWire and Asp applications are written in Javascript and Jscript. This eliminates the potential problems associated with using a second, less familiar , language for writing CGI programs.

]The less experience  a programmer has with a language, the more likely she or he is to make mistakes potentially exploitable ones.

 

The above features significantly reduce the likelihood of security vulnerabilities in LiveWire and ASP applications. However , the potential for some vulnerability still exists . For example, suppose an application is designed in such that a Livewire redirect() method takes a client property as a parameter. A penetrator could modify client properties (client cookies or URLs) to cause the redirect() function to return a file of the penetrator's choosing.

 

Server-side plug Ins

 

Netscape and Microsoft Web servers provide other server-side programming features, such as Java and server side plug-ins. In general , any server side programming mechanism has the potential to be exploited.

 

Server side plugins are compiled and integrated with the web server software. They allow server side applications to be developed that performs better than server side Javascript applications and CGI programs. This is because they are called directly by the server instead of being run as a separate process.

 

The performance gain of server side plug-ins is offset by the difficulty of developing them. Because server side plug-ins are closely integrated with the server , any errors in the plug-in could easily result in the complete failure of the server.

 

Web Application Access Controls

 

Most Web server provide the capability to control access to certain web pages and their associated Web applications. These controls may be based on host name, IP address , user name and password, or other identification and authentication mechanisms. Failure to implement restrictions on some applications , such as your server's management software, could lead to serious security holes.

 

File Permissions

 

Operating system file permissions are closely related to Web Application access controls. These permission determine which Files users and applications are able to read , write and execute. These controls are important to protecting your Web site. In particular , write permission to the directories containing CGI programs and server configuration files should be limited to the Most trusted users. Failure to do so weakens the security of your Web server, opening it up to a broader spectrum of attacks.

 

If your server stores financial information , such as credit card Data, the permission of these files should be set to prevent them from being read by other applications. If at all possible , These files should be made write only.

 

In the event that your server is penetrated , the privileges of your server become those of the penetrator. Therefore, the login privileges of the web server itself should be limited to the minimum needed to perform its function.

 

 

Other Server Side Security Considerations

 

In addition to the vulnerability mentioned in the previous sections, Web servers are vulnerable to a wide range of attacks aimed at their application services and communication protocols.

 

If a web server supports other Internet services, such as telnet or FTP, then the server inherits all of the vulnerabilities by turning off the additional services.

If a web server is on the Internet , then it, by definition, must support the Transmission control protocol/Internet Protocol(TCP/IP). TCP/IP is notorious for its security vulnerabilities. These vulnerabilities include susceptibility to spoofing ,session hijacking, and session monitoring. While these vulnerabilities are common to all systems that are on the Internet, they need to be considered when accessing the risk of setting up a web server. If the perceived risk is too high , then you may want to implement a firewall or another network security counter measure.

 

As a final consideration , the operating system platform on which the web server runs is also a potential source of security vulnerabilities. In general , multi-user operating systems, such as UNIX, pose a higher risk than single user systems, such as the Macintosh and Windows 98.

The security of most multi user systems depends on the reliability and trustworthiness of all system users. If a single user is careless or untrustworthy , then the security of the entire system could be jeopardized. Most multiuser operating systems provide security controls, such as file permissions, that prevent a user from viewing or modifying the files of others. However, to be effective , these controls must be correctly applied.

 

Although Web servers exist for the Macintosh, windows 98 , and windows 95 platforms, most midlevel to high end servers run on windows NT and UNIX platforms. This is because Windows NT and Unix provide a fuller set of operating system services for implementing more complex and capable server software.

No comments:

Post a Comment