Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Soapbox
  4. Thanks for the advice

Thanks for the advice

Scheduled Pinned Locked Moved The Soapbox
databasecssdesignsecuritycryptography
14 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A AnalogNerd

    Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

    N Offline
    N Offline
    Nicholas Marty
    wrote on last edited by
    #5

    Hm. That he's a manager now might have a reason ;P If he is in charge of the security I think it's pretty much his job to ask you why you'd do it this way to see if you have considered multiple possibilites and if every every requirement gets satisfied. I guess in the end it's also his head if something gets messed up.

    A 1 Reply Last reply
    0
    • N Nicholas Marty

      Hm. That he's a manager now might have a reason ;P If he is in charge of the security I think it's pretty much his job to ask you why you'd do it this way to see if you have considered multiple possibilites and if every every requirement gets satisfied. I guess in the end it's also his head if something gets messed up.

      A Offline
      A Offline
      AnalogNerd
      wrote on last edited by
      #6

      I am all for a security review and suggestions to make anything I'm coding more secure. Sometimes it's just hard to ignore that the person doing the security review never really bothered with it when he was coding.

      J 1 Reply Last reply
      0
      • R Rage

        18 months is not "new" ... Apart from that, welcome to the club of taking over stuff written by others. In overall, I am glad these people exist, it means employment for us.

        ~RaGE();

        I think words like 'destiny' are a way of trying to find order where none exists. - Christian Graus Do not feed the troll ! - Common proverb

        A Offline
        A Offline
        AnalogNerd
        wrote on last edited by
        #7

        I've rewritten 4 of the legacy in my "spare time" and the old ones are now gone, as well as a few superfluous web services these app relied on for no good reason. I've got 5 more to go. In 10 years maybe I'll be the person someone is coming on CP to complain about the (then) legacy apps that I wrote :-D

        1 Reply Last reply
        0
        • A AnalogNerd

          I am all for a security review and suggestions to make anything I'm coding more secure. Sometimes it's just hard to ignore that the person doing the security review never really bothered with it when he was coding.

          J Offline
          J Offline
          Jorgen Andersson
          wrote on last edited by
          #8

          You can learn a lot in seven years, and maybe he would have appreciated some mentorship himself when he was writing those programs. In my experience, programs seldom get updated unless they're broken or lack functionality, almost never because they're badly written.

          Be excellent to each other. And... PARTY ON, DUDES! Abraham Lincoln

          1 Reply Last reply
          0
          • A AnalogNerd

            Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

            M Offline
            M Offline
            Mycroft Holmes
            wrote on last edited by
            #9

            I'm with Jorgen on this one, seems to me the guy has learnt a few thing over the last 7 years. Bloody hell I hate to refactor my own code that is 2 years old! Besides it is his job to poke around your concepts and decisions he may also want the reasoning behind your decision so he can continue to learn.

            Never underestimate the power of human stupidity RAH

            N 1 Reply Last reply
            0
            • M Mycroft Holmes

              I'm with Jorgen on this one, seems to me the guy has learnt a few thing over the last 7 years. Bloody hell I hate to refactor my own code that is 2 years old! Besides it is his job to poke around your concepts and decisions he may also want the reasoning behind your decision so he can continue to learn.

              Never underestimate the power of human stupidity RAH

              N Offline
              N Offline
              Nicholas Marty
              wrote on last edited by
              #10

              Haha. I might even be afraid of touching code written 2 years ago :laugh:

              1 Reply Last reply
              0
              • A AnalogNerd

                Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

                J Offline
                J Offline
                Joan M
                wrote on last edited by
                #11

                Who knows, he had no enough time at the moment he wrote those apps, he didn't knew about those safety features at that moment, now that he has time (and it is his job having time for that) he has documented and read about best methods... Just enjoy doing it and learn... Without knowing the big picture no one apart of himself will know why... Just one question: why the soapbox?

                [www.tamautomation.com] Robots, CNC and PLC machines for grinding and polishing.

                A 1 Reply Last reply
                0
                • J Joan M

                  Who knows, he had no enough time at the moment he wrote those apps, he didn't knew about those safety features at that moment, now that he has time (and it is his job having time for that) he has documented and read about best methods... Just enjoy doing it and learn... Without knowing the big picture no one apart of himself will know why... Just one question: why the soapbox?

                  [www.tamautomation.com] Robots, CNC and PLC machines for grinding and polishing.

                  A Offline
                  A Offline
                  AnalogNerd
                  wrote on last edited by
                  #12

                  Good perspective, thanks. The Soapbox says it is for rants, or complaining about someone. This was a little bit of both.

                  J 1 Reply Last reply
                  0
                  • A AnalogNerd

                    Im relatively new at my company (just over 18 months). I've inherited several legacy apps (ASP classic, all over 7 years old) written by someone who is now a manager in the networking side of the house and in charge of security. I just had to clear my plans for a secure RESTful API through him. IP Filtering, a secure VPN connection, HMAC signature on the request. He then proceeds to poke and prod, why hash and not a public/private key? Why not also use a client cert? Etc. I have no problem with constructive criticism, especially if it can make the application more secure, however it burns me at some level to have this person doing it. Here's a small list of what I've found in his legacy apps: 1. Unencrypted connection strings inline in the ASP file, not in the web.config 2. Inline SQL in the ASP files with no input sanitization or parameterization 3. Try/Catches that do nothing but catch. No logging, no UI notification, just keep going. 4. SQL Accounts (with unencrypted passwords in the file, see #1) that have full dbo owner access to the database. Sometimes I just want to politely, but firmly point out that I would have to actually work fairlly hard to make my applications less secure than the ones he's written. End of rant. I feel better already :-D

                    D Offline
                    D Offline
                    Dexterus
                    wrote on last edited by
                    #13

                    He had 7 years to learn. Why assume he's the same person he was then? Plus why care who gives advice as long as it's good? You can think for this very reason, to pick up knowledge and filter on usefulness.

                    1 Reply Last reply
                    0
                    • A AnalogNerd

                      Good perspective, thanks. The Soapbox says it is for rants, or complaining about someone. This was a little bit of both.

                      J Offline
                      J Offline
                      Joan M
                      wrote on last edited by
                      #14

                      Yes, I guess you are right, typically we put things that are KSS in the lounge, but you are definitely right so... Are you still here? Nothing to see here... move along please... :rolleyes:

                      [www.tamautomation.com] Robots, CNC and PLC machines for grinding and polishing.

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups