Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Roll your own...

Roll your own...

Scheduled Pinned Locked Moved The Lounge
asp-netsecuritycsharpdotnetquestion
49 Posts 25 Posters 6 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Richard Andrew x64R Richard Andrew x64

    Hi Matt, I think this is a terrific idea, except that I don't know how breaking the chain of command might adversely affect my employment status.

    The difficult we do right away... ...the impossible takes slightly longer.

    M Offline
    M Offline
    Matt Bond
    wrote on last edited by
    #41

    Well, just send it to your boss, CC your dev team. Then keep a back-up. At least you have it for CYA purposes when things go south.

    Bond Keep all things as simple as possible, but no simpler. -said someone, somewhere

    1 Reply Last reply
    0
    • Richard Andrew x64R Richard Andrew x64

      Nothing coherent. Just a wave of the hand and being told that I was "only giving theory," as a reason to disregard what I was saying.

      The difficult we do right away... ...the impossible takes slightly longer.

      M Offline
      M Offline
      Member 14860585
      wrote on last edited by
      #42

      Is he planning a red-team attack, to make sure it works?

      1 Reply Last reply
      0
      • Richard Andrew x64R Richard Andrew x64

        So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

        The difficult we do right away... ...the impossible takes slightly longer.

        M Offline
        M Offline
        MSBassSinger
        wrote on last edited by
        #43

        Writing your own access and encryption security algorithms from the ground up, requires a level of mathematics and security experience not usually found at most companies. However, extending existing security services/systems like OAuth2, Azure Active Directory (or whatever the current name is), Azure Front Door, etc. with additional steps to weed out unwanted access, is a good idea if you can identify specific areas of attack not already in those tools. Plus, from a business and liability view, using a third party access control system reduces overall cost, and shifts potential liability of a breach to that third party (e.g. Microsoft).

        1 Reply Last reply
        0
        • Richard Andrew x64R Richard Andrew x64

          So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

          The difficult we do right away... ...the impossible takes slightly longer.

          S Offline
          S Offline
          Steve Naidamast
          wrote on last edited by
          #44

          This appears to be part of a classic kick-back scam, which is quite common among technical managers. If you see a new contractor come in the door to assist you in this project or your manager recommends an expensive software tool to assist you in this work, then there it is...

          Steve Naidamast Sr. Software Engineer Black Falcon Software, Inc. blackfalconsoftware@outlook.com

          1 Reply Last reply
          0
          • P PIEBALDconsult

            Like putting a Big Mac in your own wrapper and telling your boss you made it yourself.

            J Offline
            J Offline
            jschell
            wrote on last edited by
            #45

            Like the vegan donut place that was selling donuts from another store.

            1 Reply Last reply
            0
            • Richard Andrew x64R Richard Andrew x64

              So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

              The difficult we do right away... ...the impossible takes slightly longer.

              O Offline
              O Offline
              Owen Lawrence
              wrote on last edited by
              #46

              Seems like a pretty bad idea to me. But I had a .Net application that was working well, and Microsoft updated some security aspect and broke it. Really not appreciated. Maybe do both? - Owen -

              1 Reply Last reply
              0
              • Richard Andrew x64R Richard Andrew x64

                So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                The difficult we do right away... ...the impossible takes slightly longer.

                P Offline
                P Offline
                Paul Mauriks
                wrote on last edited by
                #47

                The only place I can think of where this would be a sensible approach, would be where it was more important that you got experience with the protocols, standards and how it all works, than it was to deliver a complete and functioning product without security issues. Paraphrasing from Bruce Schneier, Given sufficient effort, everyone is smart enough to develop a product that they cannot find fault with. Is there a more serious implementation a little further off where this might be a training opportunity?

                1 Reply Last reply
                0
                • Richard Andrew x64R Richard Andrew x64

                  So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                  The difficult we do right away... ...the impossible takes slightly longer.

                  E Offline
                  E Offline
                  englebart
                  wrote on last edited by
                  #48

                  [Authentication - OWASP Cheat Sheet Series](https://cheatsheetseries.owasp.org/cheatsheets/Authentication\_Cheat\_Sheet.html) If you do roll your own, this offers some high level considerations…

                  1 Reply Last reply
                  0
                  • Richard Andrew x64R Richard Andrew x64

                    So, to be brief, our new IT Director thinks he'd rather have us roll our own user authentication functionality, than use the components already present in the ASP.NET Core framework. I recommended strongly against this, but he waved his hand and said, "There won't be any security holes!" I don't intend to pull the eject cord on this job, so I want to ask the public, am I right, or is the IT Director right?

                    The difficult we do right away... ...the impossible takes slightly longer.

                    E Offline
                    E Offline
                    englebart
                    wrote on last edited by
                    #49

                    The other idea popping in my head… What website did this director launch before coming to your company? Do they take credit cards on the site? Bobby Tables wants a shopping spree!

                    1 Reply Last reply
                    0
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Don't have an account? Register

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups