-
Notifications
You must be signed in to change notification settings - Fork 116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When I login with bad credentials, I should get a randomly delayed response #81
Comments
I think that I'd put some protection in route.coffee |
This is an initial temporary fix for kahmali#81 The system should delay responses when unauthorized requests are made. Hackers should have some impediment. This is not a great fix, since hackers could parallelize their requests.
This would be a nice update. What would be even better is to build that functionality as a JsonRoutes middleware package, and then update Restivus to allow plugging middleware in (should be pretty easy in 0.7.0, since we use I'm thinking it could exist as error middleware, where you could pass a Another layer of middleware could then be added that would check for 401s and then generate delayed errors with a random value, as you suggested. |
Ideally, the system should lock out multiple failed requests from an IP source, and lock out multiple failed requests for a particular user, for a set period. This would require some rework since the authentication code is synchronous. |
Ahh, interesting. I'll think about the middleware path. |
This is an initial temporary fix for kahmali#81 The system should delay responses when unauthorized requests are made. Hackers should have some impediment. This is not a great fix, since hackers could parallelize their requests.
This is an initial temporary fix for kahmali#81 The system should delay responses when unauthorized requests are made. Hackers should have some impediment. This is not a great fix, since hackers could parallelize their requests.
This is an initial temporary fix for kahmali#81 The system should delay responses when unauthorized requests are made. Hackers should have some impediment. This is not a great fix, since hackers could parallelize their requests. - Resolve kahmali#81
This is an initial temporary fix for kahmali#81 The system should delay responses when unauthorized requests are made. Hackers should have some impediment. This is not a great fix, since hackers could parallelize their requests. - Resolve kahmali#81
- This is an initial temporary fix for kahmali#81 - When logging in or accessing a restricted ReST endpoint with invalid credentials, the system shall delay before responding. - Note that this is not a great fix, since hackers could distribute their requests across CPUs. - Resolve kahmali#81
- This is an initial temporary fix for kahmali#81 - When logging in or accessing a restricted ReST endpoint with invalid credentials, the system shall delay before responding. - Note that this is not a great fix, since hackers could distribute their requests across CPUs. - Resolve kahmali#81
- This is an initial temporary fix for kahmali#81 - When logging in or accessing a restricted ReST endpoint with invalid credentials, the system shall delay before responding. - Note that this is not a great fix, since hackers could distribute their requests across CPUs. - Resolve kahmali#81
- When logging in or accessing a restricted ReST endpoint with invalid credentials, the system shall delay before responding. - Note that this is not a great fix, since hackers could distribute their requests across CPUs. - This is an initial temporary fix for kahmali#81
As a hacker, I may try to dictionary attack the rest server to find user names, emails, and/or passwords.
When I do, the system should make it hard for me to do so by delaying the response.
On authentication failure, the system should delay by a random amount of time, so that I cannot measure the time and determine algorithm factors based on that time.
In addition, when I request data from an authentication protected ReST path, and I use bad token, the system should delay its response in the same way.
See Prevent Brute-Force Attacks: https://www.owasp.org/index.php/Authentication_Cheat_Sheet for other ideas.
I suspect that the system would be fine if it slowed down the response between 0.5 and 5 seconds per failed request. The system should capture how many failed attempts occurred and increase the delay as the count increases.
I'll look at some code that may help.
The text was updated successfully, but these errors were encountered: