Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Roll your own...

Roll your own...

Scheduled Pinned Locked Moved The Lounge
asp-netsecuritycsharpdotnetquestion
49 Posts 25 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M Matt Bond

    One way to manage up is to email him and his boss with your concerns, laid out with lots of details, risk analysis, cost/benefits, pros & cons of each approach. Then finish with your recommendation. It amounts to pretending that you had your boss's job and had to convince his boss which approach would be best for the company. If your boss's boss can see you doing a better job than your boss, maybe they'll fire him and give you a promotion! Of course, how effective this is (and whether or not it should even be done) depends on company culture, how much of an a** your bosses are, etc.

    Bond Keep all things as simple as possible, but no simpler. -said someone, somewhere

    Richard Andrew x64R Offline
    Richard Andrew x64R Offline
    Richard Andrew x64
    wrote on last edited by
    #40

    Hi Matt, I think this is a terrific idea, except that I don't know how breaking the chain of command might adversely affect my employment status.

    The difficult we do right away... ...the impossible takes slightly longer.

    M 1 Reply Last reply
    0
    • Richard Andrew x64R Richard Andrew x64

      Hi Matt, I think this is a terrific idea, except that I don't know how breaking the chain of command might adversely affect my employment status.

      The difficult we do right away... ...the impossible takes slightly longer.

      M Offline
      M Offline
      Matt Bond
      wrote on last edited by
      #41

      Well, just send it to your boss, CC your dev team. Then keep a back-up. At least you have it for CYA purposes when things go south.

      Bond Keep all things as simple as possible, but no simpler. -said someone, somewhere

      1 Reply Last reply
      0
      • Richard Andrew x64R Richard Andrew x64

        Nothing coherent. Just a wave of the hand and being told that I was "only giving theory," as a reason to disregard what I was saying.

        The difficult we do right away... ...the impossible takes slightly longer.

        M Offline
        M Offline
        Member 14860585
        wrote on last edited by
        #42

        Is he planning a red-team attack, to make sure it works?

        1 Reply Last reply
        0
        • Richard Andrew x64R Richard Andrew x64

          So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

          The difficult we do right away... ...the impossible takes slightly longer.

          M Offline
          M Offline
          MSBassSinger
          wrote on last edited by
          #43

          Writing your own access and encryption security algorithms from the ground up, requires a level of mathematics and security experience not usually found at most companies. However, extending existing security services/systems like OAuth2, Azure Active Directory (or whatever the current name is), Azure Front Door, etc. with additional steps to weed out unwanted access, is a good idea if you can identify specific areas of attack not already in those tools. Plus, from a business and liability view, using a third party access control system reduces overall cost, and shifts potential liability of a breach to that third party (e.g. Microsoft).

          1 Reply Last reply
          0
          • Richard Andrew x64R Richard Andrew x64

            So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

            The difficult we do right away... ...the impossible takes slightly longer.

            S Offline
            S Offline
            Steve Naidamast
            wrote on last edited by
            #44

            This appears to be part of a classic kick-back scam, which is quite common among technical managers. If you see a new contractor come in the door to assist you in this project or your manager recommends an expensive software tool to assist you in this work, then there it is...

            Steve Naidamast Sr. Software Engineer Black Falcon Software, Inc. blackfalconsoftware@outlook.com

            1 Reply Last reply
            0
            • P PIEBALDconsult

              Like putting a Big Mac in your own wrapper and telling your boss you made it yourself.

              J Offline
              J Offline
              jschell
              wrote on last edited by
              #45

              Like the vegan donut place that was selling donuts from another store.

              1 Reply Last reply
              0
              • Richard Andrew x64R Richard Andrew x64

                So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                The difficult we do right away... ...the impossible takes slightly longer.

                O Offline
                O Offline
                Owen Lawrence
                wrote on last edited by
                #46

                Seems like a pretty bad idea to me. But I had a .Net application that was working well, and Microsoft updated some security aspect and broke it. Really not appreciated. Maybe do both? - Owen -

                1 Reply Last reply
                0
                • Richard Andrew x64R Richard Andrew x64

                  So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                  The difficult we do right away... ...the impossible takes slightly longer.

                  P Offline
                  P Offline
                  Paul Mauriks
                  wrote on last edited by
                  #47

                  The only place I can think of where this would be a sensible approach, would be where it was more important that you got experience with the protocols, standards and how it all works, than it was to deliver a complete and functioning product without security issues. Paraphrasing from Bruce Schneier, Given sufficient effort, everyone is smart enough to develop a product that they cannot find fault with. Is there a more serious implementation a little further off where this might be a training opportunity?

                  1 Reply Last reply
                  0
                  • Richard Andrew x64R Richard Andrew x64

                    So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                    The difficult we do right away... ...the impossible takes slightly longer.

                    E Offline
                    E Offline
                    englebart
                    wrote on last edited by
                    #48

                    [Authentication - OWASP Cheat Sheet Series](https://cheatsheetseries.owasp.org/cheatsheets/Authentication\_Cheat\_Sheet.html) If you do roll your own, this offers some high level considerations…

                    1 Reply Last reply
                    0
                    • Richard Andrew x64R Richard Andrew x64

                      So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                      The difficult we do right away... ...the impossible takes slightly longer.

                      E Offline
                      E Offline
                      englebart
                      wrote on last edited by
                      #49

                      The other idea popping in my head… What website did this director launch before coming to your company? Do they take credit cards on the site? Bobby Tables wants a shopping spree!

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups