_______________________________________________ Owasp-dotnet mailing list Owasp-...@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-dotnet
I don’t know if Barry is on this list but the new WPL has CSRF protection and is OSS via an MS-PL license (OSI approved)
He is, but under his home address. The WPL has *plans* for it, but there’s nothing there as yet, I’ve got a shed load of internal bugs to fix now I’ve opened up a plug-in model (which will get pushed to the source tree on codeplex in a few weeks as soon as I can figure out what processes I need to put in place for that).
As you’re all aware GET tokens are somewhat contentious, as is trying to parse the output of a request to look for links to mangle. My plan is to take the approach from AntiCSRF (http://anticsrfcodeplex.com/) as a starting point when we do start to implement, which uses cookies rather than session, but I’m still in two minds about GETs, plus we’ll only ever protect anything in a webforms runat server form. I simply don’t want to get into regular expressions over binary streams. Non-idempotent GETS? I’m tempted to say you get what you deserve here -however someone I know well who works for a rather large bank has asked if I can look at it.
Other fun questions include what happens in protocol transition, although this isn’t limited to GET requests of course J
Actually it would be interesting to get feedback on the plug-in approach. Basically I’m trying to get the Security Runtime Engine from the WPL as just a holding and reporting harness on which you can write your own plug-ins, avoiding the strain of having multiple HttpModules and opt-out mechanisms.
I blogged about the potential approach http://idunno.org/archive/2010/05/03/further-work-on-wpl-plugins.aspx - the configuration bit has changed a little to make it more testable, and of course it may all change once I’ve gathered the feedback. If you have any then emails here, or blog comments, or to me directly, either at home, or at ms (bdorrans@) will all be taken into account.
Barry
Its open source already, it’s just the source tree has only ever been updated with a full release. I’ll look at how I update connect and make that download vanish, it’s very out of date.
This month’s planned CTP code only drop, which will appear on http://antixss.codeplex.com/ (which I ought to rename at some point) will not have CSRF protection – it’s there to show the new model and gather feedback, along with a few simple plugins and a rewrite of the existing Encoding and Sql Injection bits. It needs a lot more tests before I’m happy to even label it beta. And as a bunch of you are no-doubt aware testing ASP.NET is not the easiest thing in the world – although you will see I took a dependency on .NET 3.51 SP1 so I can use System.Web.Abstractions in order to make unit testing possible.
Basically ignore what’s on codeplex and connect right now, because I rewrote the SRE part and exposed points with which you can write your own plugins (hence the blog post). This will appear as a zip, and an update to the source tree in a few weeks’ time. I’ve only been at MS for a few months, so I’m discovering the processes for this as I go along *grin*