Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Soapbox
  4. Thanks for the advice

Thanks for the advice

Scheduled Pinned Locked Moved The Soapbox
databasecssdesignsecuritycryptography
14 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A Offline
    A Offline
    AnalogNerd
    wrote on last edited by
    #1

    Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

    R OriginalGriffO N M J 6 Replies Last reply
    0
    • A AnalogNerd

      Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

      R Offline
      R Offline
      Rage
      wrote on last edited by
      #2

      18 months is not "new" ... Apart from that, welcome to the club of taking over stuff written by others. In overall, I am glad these people exist, it means employment for us.

      ~RaGE();

      I think words like 'destiny' are a way of trying to find order where none exists. - Christian Graus Do not feed the troll ! - Common proverb

      OriginalGriffO A 2 Replies Last reply
      0
      • A AnalogNerd

        Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

        OriginalGriffO Offline
        OriginalGriffO Offline
        OriginalGriff
        wrote on last edited by
        #3

        Hey! Stop moping and look on the bright side. He didn't leave it prone to HTML injection, did he? :laugh: (Just everything else...)

        This message is manufactured from fully recyclable noughts and ones. To recycle this message, please separate into two tidy piles, and take them to your nearest local recycling centre. Please note that in some areas noughts are always replaced with zeros by law, and many facilities cannot recycle zeroes - in this case, please bury them in your back garden and water frequently.

        "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
        "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

        1 Reply Last reply
        0
        • R Rage

          18 months is not "new" ... Apart from that, welcome to the club of taking over stuff written by others. In overall, I am glad these people exist, it means employment for us.

          ~RaGE();

          I think words like 'destiny' are a way of trying to find order where none exists. - Christian Graus Do not feed the troll ! - Common proverb

          OriginalGriffO Offline
          OriginalGriffO Offline
          OriginalGriff
          wrote on last edited by
          #4

          ...and we can look good by pointing out the security flaws... ;)

          This message is manufactured from fully recyclable noughts and ones. To recycle this message, please separate into two tidy piles, and take them to your nearest local recycling centre. Please note that in some areas noughts are always replaced with zeros by law, and many facilities cannot recycle zeroes - in this case, please bury them in your back garden and water frequently.

          "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
          "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

          1 Reply Last reply
          0
          • A AnalogNerd

            Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

            N Offline
            N Offline
            Nicholas Marty
            wrote on last edited by
            #5

            Hm. That he's a manager now might have a reason ;P If he is in charge of the security I think it's pretty much his job to ask you why you'd do it this way to see if you have considered multiple possibilites and if every every requirement gets satisfied. I guess in the end it's also his head if something gets messed up.

            A 1 Reply Last reply
            0
            • N Nicholas Marty

              Hm. That he's a manager now might have a reason ;P If he is in charge of the security I think it's pretty much his job to ask you why you'd do it this way to see if you have considered multiple possibilites and if every every requirement gets satisfied. I guess in the end it's also his head if something gets messed up.

              A Offline
              A Offline
              AnalogNerd
              wrote on last edited by
              #6

              I am all for a security review and suggestions to make anything I'm coding more secure. Sometimes it's just hard to ignore that the person doing the security review never really bothered with it when he was coding.

              J 1 Reply Last reply
              0
              • R Rage

                18 months is not "new" ... Apart from that, welcome to the club of taking over stuff written by others. In overall, I am glad these people exist, it means employment for us.

                ~RaGE();

                I think words like 'destiny' are a way of trying to find order where none exists. - Christian Graus Do not feed the troll ! - Common proverb

                A Offline
                A Offline
                AnalogNerd
                wrote on last edited by
                #7

                I've rewritten 4 of the legacy in my "spare time" and the old ones are now gone, as well as a few superfluous web services these app relied on for no good reason. I've got 5 more to go. In 10 years maybe I'll be the person someone is coming on CP to complain about the (then) legacy apps that I wrote :-D

                1 Reply Last reply
                0
                • A AnalogNerd

                  I am all for a security review and suggestions to make anything I'm coding more secure. Sometimes it's just hard to ignore that the person doing the security review never really bothered with it when he was coding.

                  J Offline
                  J Offline
                  Jorgen Andersson
                  wrote on last edited by
                  #8

                  You can learn a lot in seven years, and maybe he would have appreciated some mentorship himself when he was writing those programs. In my experience, programs seldom get updated unless they're broken or lack functionality, almost never because they're badly written.

                  Be excellent to each other. And... PARTY ON, DUDES! Abraham Lincoln

                  1 Reply Last reply
                  0
                  • A AnalogNerd

                    Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

                    M Offline
                    M Offline
                    Mycroft Holmes
                    wrote on last edited by
                    #9

                    I'm with Jorgen on this one, seems to me the guy has learnt a few thing over the last 7 years. Bloody hell I hate to refactor my own code that is 2 years old! Besides it is his job to poke around your concepts and decisions he may also want the reasoning behind your decision so he can continue to learn.

                    Never underestimate the power of human stupidity RAH

                    N 1 Reply Last reply
                    0
                    • M Mycroft Holmes

                      I'm with Jorgen on this one, seems to me the guy has learnt a few thing over the last 7 years. Bloody hell I hate to refactor my own code that is 2 years old! Besides it is his job to poke around your concepts and decisions he may also want the reasoning behind your decision so he can continue to learn.

                      Never underestimate the power of human stupidity RAH

                      N Offline
                      N Offline
                      Nicholas Marty
                      wrote on last edited by
                      #10

                      Haha. I might even be afraid of touching code written 2 years ago :laugh:

                      1 Reply Last reply
                      0
                      • A AnalogNerd

                        Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

                        J Offline
                        J Offline
                        Joan M
                        wrote on last edited by
                        #11

                        Who knows, he had no enough time at the moment he wrote those apps, he didn't knew about those safety features at that moment, now that he has time (and it is his job having time for that) he has documented and read about best methods... Just enjoy doing it and learn... Without knowing the big picture no one apart of himself will know why... Just one question: why the soapbox?

                        [www.tamautomation.com] Robots, CNC and PLC machines for grinding and polishing.

                        A 1 Reply Last reply
                        0
                        • J Joan M

                          Who knows, he had no enough time at the moment he wrote those apps, he didn't knew about those safety features at that moment, now that he has time (and it is his job having time for that) he has documented and read about best methods... Just enjoy doing it and learn... Without knowing the big picture no one apart of himself will know why... Just one question: why the soapbox?

                          [www.tamautomation.com] Robots, CNC and PLC machines for grinding and polishing.

                          A Offline
                          A Offline
                          AnalogNerd
                          wrote on last edited by
                          #12

                          Good perspective, thanks. The Soapbox says it is for rants, or complaining about someone. This was a little bit of both.

                          J 1 Reply Last reply
                          0
                          • A AnalogNerd

                            Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

                            D Offline
                            D Offline
                            Dexterus
                            wrote on last edited by
                            #13

                            He had 7 years to learn. Why assume he's the same person he was then? Plus why care who gives advice as long as it's good? You can think for this very reason, to pick up knowledge and filter on usefulness.

                            1 Reply Last reply
                            0
                            • A AnalogNerd

                              Good perspective, thanks. The Soapbox says it is for rants, or complaining about someone. This was a little bit of both.

                              J Offline
                              J Offline
                              Joan M
                              wrote on last edited by
                              #14

                              Yes, I guess you are right, typically we put things that are KSS in the lounge, but you are definitely right so... Are you still here? Nothing to see here... move along please... :rolleyes:

                              [www.tamautomation.com] Robots, CNC and PLC machines for grinding and polishing.

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups