Dr. Drew Hwang, CIS, Cal Poly Pomona
Secure Web Development
Unrestricted URL Access
Authentication is a security measure in computing designed to verify the claimed identity of an entity before it is given a privilege to access any protected resources. Although authentication is conceptually the simplest of all the security mechanisms employed within web applications, its functionality is subject to more design weaknesses than any other security mechanism commonly employed.
The Authentication Model
The authentication model is consisted of four components:
- a piece of information offered by an entity to claim its authenticity.
knowledge-based (what the entity knows) - password, ID, PIN, etc.
possession-based (what the entity has) - passport, token, ID-card, etc.
biometric-based (what the entity is) - fingerprint, face geometry, etc.
- the interface used to offer the proof. This commonly is a computer keyboard, card reader, OCR, video camera, and so on.
- the segment that transfers the proof between the input interface and the verification component.
- the component that verify the proof.
using one or more types of factor for authentication.
: for example, one knowledge-based factor such as username and password
: for example, using an account number (knowledge-based) and the IP or machine ID of the the client (possession-based).
: for example, using the Microsoft Passport authentication service.
This authentication relies on the Web server for authentication to protected areas and is supported by nearly all browsers.
When a user accesses a site, a standard popup window is created by the browser to ask for username and password.
The username and password combination is then encoded (base 64) and passed in an unencrypted form to the Web server. The Web server compares the encoded value against values stored in a flat file, a database, or a directory server.
If the user is authenticated, the server then verifies that the user has the privilege to access the requested page against a file, such as httpd.conf.
If the user has access, the Web server then serves the page.
If the user is denied access, the server either requests the username/password combination again or presents an error message on the browser window.
It is the most common authentication approaches employed by web applications.
It uses HTML forms to capture a username and password and submit these to the application.
Upon validating the user's credentials, the website stores an authentication ticket cookie on the user's browser, which is sent with every subsequent request to the website and is what is used to authenticate the user.
In more security-critical web applications, this basic mechanism is often expanded into multiple stages, requiring the user to submit additional credentials, such as PIN numbers or selected characters from a secret word.
Username enumeration is the efficient guessing of username.
Error messages in login
: Record every detail of the servers responses to each login attempt, including the status code, any redirects, information displayed on screen, and any differences hidden away in the HTML page source. Use your intercepting proxy to maintain a full history of all traffic to and from the server.
You have entered a bad username: The username does not exist. In this instance, an automated attack can be used to iterate through a large list of common usernames to enumerate which of these are valid.
You have entered a bad password: The username exists, but the password does not.
You have entered a bad username/password: Unknown.
Many web applications allow users to create their own username and password, which would present a vector to determine the username.
In the registration process, if the application returns a error message saying please choose another username, it is likely that the username just entered exists.
Username in a hidden field or cookie: Username is usually stored in a hidden filed or cookie that can be stolen.
Many web applications lock out account after a certain number of failed login attempts and automatically unlock the account after a period of time.
An application may set a cookie or hidden form to store the number of login attempts and increment this number following each unsuccessful attempt.
Account lockout policy is not valid for non-existing accounts.
It is best not to inform the user that the account is being locked out.
ASP.net membership providers can choose to implement account lockouts mechanism.
keeps track of failed attempts at using a password by storing tracking information in the
columns of the
The first time an incorrect password is supplied, two things occur:
in the Default.aspx is incremented by one.
column is set to the current UTC date time.
The next time a password parameter is called the
: Many authentication mechanisms disclose usernames either implicitly or explicitly. In a web mail account, the username is often the email address, which is common knowledge by design. Many other sites expose usernames within the application without considering the advantage this grants to an attacker, or allow usernames to be easily guessed
Review the web site for any description of the rules.
If self-registration is possible, attempt to register several accounts with different kinds of weak passwords to discover what rules are in place.
If you control a single account and password change is possible, attempt to change your password to various weak values.
: If a web application allows an attacker to make repeated login attempts with different passwords until the correct one is guessed, then it is highly vulnerable. Given todays bandwidth and processing capabilities, it is possible to automatically make thousands of login attempts per minute. As a result, even the most robust passwords will be eventually broken.
Manually submit several bad login attempts for an account you control, monitoring the error messages received.
After around 10 failed logins, if the application has not returned any message about account lockout, attempt to login correctly. If this succeeds, there is probably no account lockout policy.
If you do not control any accounts, attempt to enumerate a valid username and make several bad logins using this, monitoring for any error messages about account lockout.
To mount a brute-force attack, first identify a difference in the applications behavior in response to successful and failed logins, which can be used to discriminate between these during the course of the automated attack.
Obtain a list of enumerated or common usernames and a list of common passwords. Use any information obtained about password quality rules to tailor the password list so as to avoid superfluous test cases.
Use a suitable tool or a custom script to quickly generate login requests using all permutations of these usernames and passwords. Monitor the servers responses to identify login attempts that are successful.
User login credentials can be eavesdropped if a web application uses an unencrypted HTTP connection.
Even if login occurs over HTTPS, credentials may still be disclosed to unauthorized parties if the application handles them in an unsafe manner:
The credentials are transmitted as query string parameters.
Although most web applications do use the body of a POST request to submit the HTML login form itself, it is surprisingly common to see the login request being handled via a redirect to a different URL with the same credentials passed as query string parameters.
Web applications sometimes store user credentials in cookies, usually to implement poorly designed mechanisms for login, password change, remember me, and so on. These credentials are vulnerable.
Use strong credentials
: Suitable minimum password quality requirements should be enforced. These may include rules regarding: minimum length; the appearance of alphabetical, numeric, and typographical characters; the appearance of both uppercase and lowercase characters; the avoidance of dictionary words, names, and other common passwords; the prevention of a password being set to the username; and the prevention of a similarity or match with previously set passwords.
Employ sufficient entropy
: Any system-generated usernames and passwords should be created with sufficient entropy that they cannot feasibly be sequenced or predicted even by an attacker who gains access to a large sample of successively generated instances.
Handle credentials secretively
All credentials should be created, stored, and transmitted in a manner that does not lead to unauthorized disclosure.
All client-server communications should be protected using a cryptographic technology, such as SSL.
Only POST requests should be used for transmitting credentials to the server. Credentials should never be placed in URL parameters or cookies and should never be transmitted back to the client, even in parameters to a redirect.
All server-side application components should store credentials in a manner that does not allow their original values to be easily recovered even by an attacker who gains full access to all the relevant data within the applications database.
Client-side remember me functionality should in general only remember non-secret items such as usernames. In less security-critical applications, it may be considered appropriate to allow users to opt in to a facility to remember passwords. In this situation, no clear-text credentials should be stored on the client, and users should be warned about the risks from an attacker with physical access to their computer or who compromises their computer remotely.
A password change facility should be implemented, and users should be obliged to change their password periodically.
Where applicable, consider capturing some of the users login information (for example, single letters from a memorable word) using dropdown menus rather than text fields. This will prevent any keyloggers installed on the users computer from capturing all of the data they submit.
Validate credentials properly
Passwords should be validated in full that is, in a case-sensitive way, without filtering or modifying any characters, and without truncating the password.
The application should be aggressive in defending itself against unexpected events occurring during login processing.
All authentication logic should be closely code-reviewed, both as pseudo-code and as actual application source code, to identify logic errors such as fail-open conditions.
Multistage logins should be strictly controlled to prevent an attacker from interfering with the transitions and relationships between the stages.
Prevent information leakage
The web application should not disclose any information about authentication parameters, either through overt messages or through inference from other aspects of the applications behavior.
If the application supports self-registration, then it can prevent this function from being used to enumerate existing usernames.
Do not store password in cookies.
Prevent brute-force attacks
Use unpredictable usernames and preventing their enumeration presents a significant obstacle to completely blind brute-force attacks, and HTTP status codes, other information hidden in HTML, and the like.
Disable an account after a small number of failed logins and require that the account owner take various out-of-band steps to reactivate the account, such as telephoning customer support and answering a series of security questions.
A web application can specifically protect itself against this kind of attack through the use of CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) challenges on every page that may be a target for brute-force attacks. A CAPTCHA is a type of challenge-response test used in computing to determine that the response is not generated by a computer. The process involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. A common type of CAPTCHA requires that the user type the letters of a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen.
: While authentication itself is critical aspect to secure, even solid authentication mechanisms can be undermined by flawed credential management functions, including password change, "forgot my password", "remember my password", account update, and other related functions. Because "walk by" attacks are likely for many web applications, all account management functions should require re-authentication even if the user has a valid session id, in case an attacker has discovered a session where the original user has failed to log out.