Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Roll your own...

Roll your own...

Scheduled Pinned Locked Moved The Lounge
asp-netsecuritycsharpdotnetquestion
49 Posts 25 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Richard Andrew x64R Richard Andrew x64

    Thank you! That's what I thought. Other people in the company have said to me that they think he's a bit of a charlatan. He is a big talker to upper management.

    The difficult we do right away... ...the impossible takes slightly longer.

    S Offline
    S Offline
    Snorri Kristjansson
    wrote on last edited by
    #36

    Maybe it's time to look for another job?

    1 Reply Last reply
    0
    • Richard Andrew x64R Richard Andrew x64

      So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

      The difficult we do right away... ...the impossible takes slightly longer.

      D Offline
      D Offline
      David Crow
      wrote on last edited by
      #37

      Gather metrics to eliminate the "my opinion vs. your opinion" thing.

      "One man's wage rise is another man's price increase." - Harold Wilson

      "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

      "You can easily judge the character of a man by how he treats those who can do nothing for him." - James D. Miles

      1 Reply Last reply
      0
      • Richard Andrew x64R Richard Andrew x64

        So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

        The difficult we do right away... ...the impossible takes slightly longer.

        B Offline
        B Offline
        BryanFazekas
        wrote on last edited by
        #38

        I'll chime in -- your director is clueless. Based upon your comments, my guess is that he wants to be able to take credit for "leading the project" when applying for his next job after he FUBAR's this one. Provide him with 2 estimates: 1. # hours required to implement the ASP.NET Core framework. 2. # hours required to implement a home-grown solution. If estimate #2 is not at least 100 times the size of estimate #1, I'll be surprised. Never argue with idiots -- beat them about the head-and-shoulders with facts.

        1 Reply Last reply
        0
        • Richard Andrew x64R Richard Andrew x64

          Thank you! That's what I thought. Other people in the company have said to me that they think he's a bit of a charlatan. He is a big talker to upper management.

          The difficult we do right away... ...the impossible takes slightly longer.

          M Offline
          M Offline
          Matt Bond
          wrote on last edited by
          #39

          One way to manage up is to email him and his boss with your concerns, laid out with lots of details, risk analysis, cost/benefits, pros & cons of each approach. Then finish with your recommendation. It amounts to pretending that you had your boss's job and had to convince his boss which approach would be best for the company. If your boss's boss can see you doing a better job than your boss, maybe they'll fire him and give you a promotion! Of course, how effective this is (and whether or not it should even be done) depends on company culture, how much of an a** your bosses are, etc.

          Bond Keep all things as simple as possible, but no simpler. -said someone, somewhere

          Richard Andrew x64R 1 Reply Last reply
          0
          • M Matt Bond

            One way to manage up is to email him and his boss with your concerns, laid out with lots of details, risk analysis, cost/benefits, pros & cons of each approach. Then finish with your recommendation. It amounts to pretending that you had your boss's job and had to convince his boss which approach would be best for the company. If your boss's boss can see you doing a better job than your boss, maybe they'll fire him and give you a promotion! Of course, how effective this is (and whether or not it should even be done) depends on company culture, how much of an a** your bosses are, etc.

            Bond Keep all things as simple as possible, but no simpler. -said someone, somewhere

            Richard Andrew x64R Offline
            Richard Andrew x64R Offline
            Richard Andrew x64
            wrote on last edited by
            #40

            Hi Matt, I think this is a terrific idea, except that I don't know how breaking the chain of command might adversely affect my employment status.

            The difficult we do right away... ...the impossible takes slightly longer.

            M 1 Reply Last reply
            0
            • Richard Andrew x64R Richard Andrew x64

              Hi Matt, I think this is a terrific idea, except that I don't know how breaking the chain of command might adversely affect my employment status.

              The difficult we do right away... ...the impossible takes slightly longer.

              M Offline
              M Offline
              Matt Bond
              wrote on last edited by
              #41

              Well, just send it to your boss, CC your dev team. Then keep a back-up. At least you have it for CYA purposes when things go south.

              Bond Keep all things as simple as possible, but no simpler. -said someone, somewhere

              1 Reply Last reply
              0
              • Richard Andrew x64R Richard Andrew x64

                Nothing coherent. Just a wave of the hand and being told that I was "only giving theory," as a reason to disregard what I was saying.

                The difficult we do right away... ...the impossible takes slightly longer.

                M Offline
                M Offline
                Member 14860585
                wrote on last edited by
                #42

                Is he planning a red-team attack, to make sure it works?

                1 Reply Last reply
                0
                • Richard Andrew x64R Richard Andrew x64

                  So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                  The difficult we do right away... ...the impossible takes slightly longer.

                  M Offline
                  M Offline
                  MSBassSinger
                  wrote on last edited by
                  #43

                  Writing your own access and encryption security algorithms from the ground up, requires a level of mathematics and security experience not usually found at most companies. However, extending existing security services/systems like OAuth2, Azure Active Directory (or whatever the current name is), Azure Front Door, etc. with additional steps to weed out unwanted access, is a good idea if you can identify specific areas of attack not already in those tools. Plus, from a business and liability view, using a third party access control system reduces overall cost, and shifts potential liability of a breach to that third party (e.g. Microsoft).

                  1 Reply Last reply
                  0
                  • Richard Andrew x64R Richard Andrew x64

                    So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                    The difficult we do right away... ...the impossible takes slightly longer.

                    S Offline
                    S Offline
                    Steve Naidamast
                    wrote on last edited by
                    #44

                    This appears to be part of a classic kick-back scam, which is quite common among technical managers. If you see a new contractor come in the door to assist you in this project or your manager recommends an expensive software tool to assist you in this work, then there it is...

                    Steve Naidamast Sr. Software Engineer Black Falcon Software, Inc. blackfalconsoftware@outlook.com

                    1 Reply Last reply
                    0
                    • P PIEBALDconsult

                      Like putting a Big Mac in your own wrapper and telling your boss you made it yourself.

                      J Offline
                      J Offline
                      jschell
                      wrote on last edited by
                      #45

                      Like the vegan donut place that was selling donuts from another store.

                      1 Reply Last reply
                      0
                      • Richard Andrew x64R Richard Andrew x64

                        So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                        The difficult we do right away... ...the impossible takes slightly longer.

                        O Offline
                        O Offline
                        Owen Lawrence
                        wrote on last edited by
                        #46

                        Seems like a pretty bad idea to me. But I had a .Net application that was working well, and Microsoft updated some security aspect and broke it. Really not appreciated. Maybe do both? - Owen -

                        1 Reply Last reply
                        0
                        • Richard Andrew x64R Richard Andrew x64

                          So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                          The difficult we do right away... ...the impossible takes slightly longer.

                          P Offline
                          P Offline
                          Paul Mauriks
                          wrote on last edited by
                          #47

                          The only place I can think of where this would be a sensible approach, would be where it was more important that you got experience with the protocols, standards and how it all works, than it was to deliver a complete and functioning product without security issues. Paraphrasing from Bruce Schneier, Given sufficient effort, everyone is smart enough to develop a product that they cannot find fault with. Is there a more serious implementation a little further off where this might be a training opportunity?

                          1 Reply Last reply
                          0
                          • Richard Andrew x64R Richard Andrew x64

                            So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                            The difficult we do right away... ...the impossible takes slightly longer.

                            E Offline
                            E Offline
                            englebart
                            wrote on last edited by
                            #48

                            [Authentication - OWASP Cheat Sheet Series](https://cheatsheetseries.owasp.org/cheatsheets/Authentication\_Cheat\_Sheet.html) If you do roll your own, this offers some high level considerations…

                            1 Reply Last reply
                            0
                            • Richard Andrew x64R Richard Andrew x64

                              So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                              The difficult we do right away... ...the impossible takes slightly longer.

                              E Offline
                              E Offline
                              englebart
                              wrote on last edited by
                              #49

                              The other idea popping in my head… What website did this director launch before coming to your company? Do they take credit cards on the site? Bobby Tables wants a shopping spree!

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups