You are not logged in. Your edit will be placed in a queue until it is peer reviewed.
We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.
Required fields*
- Thank you. Can you elaborate? Of course all threats bar those I mitigated remain. That's exactly what I'm asking about. what are those threats? You mentioned CSRF. What else is there, again, assuming the attacker is outside and does not have a valid cert for the server.. I understand that the insider threats exist. I just want to limit the scope of the question. I first want to make sure I considered all reasonable threats that fall within the scope of the question.IamNaN– IamNaN2024-11-13 00:34:57 +00:00Commented Nov 13, 2024 at 0:34
- 5@IamNaN: Like I said, CSRF breaks the barrier between “inside” and “outside”, so making this distinction isn’t useful and probably even counterproductive. Proxies, firewalls, strong authentication etc. are all reasonable security measures, but the web application cannot rely on them. When you assess the security of the application, assume that an attacker can send any request they want. This means you have to deal with the same threats as any other web application. If you’re not sure what those threats are, the OWASP Top 10 are a good starting point.Ja1024– Ja10242024-11-13 01:26:46 +00:00Commented Nov 13, 2024 at 1:26
- @IamNaN Unfortunately, not only is the current threat landscape vast, it's constantly changing (generally getting larger). A list of all, or even almost all, possible threats doesn't seem feasible in a stack exchange answer. If you want to effectively evaluate the attack surface of a system you support, my strong recommendation is to use one or more vulnerability scanning tools and/or services. If you dive into these tools and the supporting documentation, you'll find that there can be thousands of vulnerabilities for a single component of a system.Todd Wilcox– Todd Wilcox2024-11-13 19:22:48 +00:00Commented Nov 13, 2024 at 19:22
- "and private keys do get compromised (especially when users store them as files without proper protection)" The windows keystore has the ability to store client certs such that the user is allowed to use them in e.gg. browser requests but not export the private key (I've read that admin users can work around this.) I'm curious what your opinion is on this type of scheme in general and in Windows.JimmyJames– JimmyJames2024-11-14 22:21:52 +00:00Commented Nov 14, 2024 at 22:21
- 1One way to look at it: There is a whole variety of possible attacks, which stem from the fact of using the same application (a browser) for your protected app as well as executing third party code (other websites). Most stem from the fact that the code of different websites can interact (CSRF, click jacking, iframes, parameter injection, ...) some from the fact that code runs in the same process (extensions, timing-attacks, out of bounds memory access, ...)Falco– Falco2024-11-15 09:33:44 +00:00Commented Nov 15, 2024 at 9:33
Add a comment |
How to Edit
- Correct minor typos or mistakes
- Clarify meaning without changing it
- Add related resources or links
- Always respect the author’s intent
- Don’t use edits to reply to the author
How to Format
- create code fences with backticks ` or tildes ~ ```
like so
``` - add language identifier to highlight code ```python
def function(foo):
print(foo)
``` - put returns between paragraphs
- for linebreak add 2 spaces at end
- _italic_ or **bold**
- quote by placing > at start of line
- to make links (use https whenever possible) <https://example.com>[example](https://example.com)<a href="https://example.com">example</a>
How to Tag
A tag is a keyword or label that categorizes your question with other, similar questions. Choose one or more (up to 5) tags that will help answerers to find and interpret your question.
- complete the sentence: my question is about...
- use tags that describe things or concepts that are essential, not incidental to your question
- favor using existing popular tags
- read the descriptions that appear below the tag
If your question is primarily about a topic for which you can't find a tag:
- combine multiple words into single-words with hyphens (e.g. web-application), up to a maximum of 35 characters
- creating new tags is a privilege; if you can't yet create a tag you need, then post this question without it, then ask the community to create it for you