Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 23FBE200BE7 for ; Tue, 20 Dec 2016 10:55:04 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id 22720160B29; Tue, 20 Dec 2016 09:55:04 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 6D95B160B1B for ; Tue, 20 Dec 2016 10:55:03 +0100 (CET) Received: (qmail 84208 invoked by uid 500); 20 Dec 2016 09:54:57 -0000 Mailing-List: contact users-help@myfaces.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "MyFaces Discussion" Delivered-To: mailing list users@myfaces.apache.org Received: (qmail 84192 invoked by uid 99); 20 Dec 2016 09:54:57 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 20 Dec 2016 09:54:57 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id 9EBC21A9A9D for ; Tue, 20 Dec 2016 09:54:56 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 1.88 X-Spam-Level: * X-Spam-Status: No, score=1.88 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=2, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=disabled Authentication-Results: spamd2-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id gd5VQwp9kHJN for ; Tue, 20 Dec 2016 09:54:54 +0000 (UTC) Received: from mail-wj0-f180.google.com (mail-wj0-f180.google.com [209.85.210.180]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTPS id 3EABE5FDAD for ; Tue, 20 Dec 2016 09:54:54 +0000 (UTC) Received: by mail-wj0-f180.google.com with SMTP id xy5so171127199wjc.0 for ; Tue, 20 Dec 2016 01:54:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=Kct9IgpN3qh2iaGYW8qd+SeJ817Px8x119rcuPLTSuQ=; b=ovkAlgkxQ6zlqYLbzvO1j4rN6nTCHTC7tKv+caZiPn0beqWW7aEnswr3wqWOOeQZYX CQjHjXEi+7Tl4i95Cnr/IILC6GYedkJsqJDvyzb4c/g37rmd5gwaM7V3Nb+U8SNFUfPG nA7ijFEg81bDgWiX3Jyih/Frr7qEdN8pcq4ZL9cvSWrnw4hrsVU0Y9+mF8hKWynC4Tw5 p6XCgKKNwAbNEaCewclTwVI06+u61EU+vQ3Wt669RdlwQSngVWUcDV4WHI/z2oWBAMV3 zJN4+bM7BoJBwB5Q8V6t78KaKEWw3qj1AxdHQ0Qq+9HXnWQ4Jd+R7ZrdvvWpxHVZ4ZJQ zNUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=Kct9IgpN3qh2iaGYW8qd+SeJ817Px8x119rcuPLTSuQ=; b=qbgVCV5YWJelxRYP3os4RjRSmQybnSodl6diInpFwYxLuwQMLJsN53YtcJ0m6d9PbA /RhQty8ZuBwT+yvOmtr79Cz4Z2WBXWFrDleQ+aB3pA5FB9iTVyr/3iMn63xRK9XkKm/0 DQS6kpb8GsTNf68oqZwaHqGa+HjzLb+n6WGSIdyfAzChy/IFmaZ1TOXNecuc7lJS28q4 j5ZfWWLZ599dD3rGeU9CkIjZv9dvNA8E8yaWl4tTVtI9cYFCpGdpU9e4G3dMU4lugBfk 9EJrk2WIV6lFJ8+W/XJGIPgRQYPL3vKEK6a/AGjARPVD6wJB91/DF3SwEvD8emeHbVnR VeaQ== X-Gm-Message-State: AKaTC01T+wqU/A1HJ+s8wULxtTddBbtBC+ohOExteOfxtfIQfsBecRf7cYHXWI7QTnWAba589l0JFLi3hrZ5JA== X-Received: by 10.194.146.131 with SMTP id tc3mr18083601wjb.129.1482227687962; Tue, 20 Dec 2016 01:54:47 -0800 (PST) MIME-Version: 1.0 Received: by 10.28.94.76 with HTTP; Tue, 20 Dec 2016 01:54:47 -0800 (PST) In-Reply-To: References: From: karthik kn Date: Tue, 20 Dec 2016 15:24:47 +0530 Message-ID: Subject: Re: Reg vulnerability for Server State saving To: MyFaces Discussion Content-Type: multipart/alternative; boundary=089e01227936d13e16054414060f archived-at: Tue, 20 Dec 2016 09:55:04 -0000 --089e01227936d13e16054414060f Content-Type: text/plain; charset=UTF-8 Hi, Currently we are not in a position to update to 1.1.8 as the change would require a upgrade of legacy software. With just 1.1.5,based on the below, it has been mentioned that it is ok to use "Server" for state saving. Based on this, can you clarify that encryption is not required for server state saving. However, in the wiki I see the following Security configuration for Myfaces Core 1.1.7, 1.2.8, 2.0.0 and earlier When using client side state saving, the UI object model is serialized and rendered with the response. This is behavior controlled by the following context parameter. javax.faces.STATE_SAVING_METHOD client One consequence of client side state saving is that anyone with a decoder and some time to kill can reconstruct the UI object model on the client side. This can be a problem for those of us who make use of the excellent t:saveState tag. *Users of myfaces core version 1.1.7, 1.2.8, 2.0.0 and earlier MUST use server side state saving instead to prevent padding oracle attack on view state.* Enabling encryption is as easy as putting the following context parameter in your deployment descriptor. There are two things to note here. First, this uses the default encryption algorithm, DES , so the secret must have a size of eight. Second, although the secret is actually "76543210", we do not put this directly in the deployment descriptor. Instead, we place it's base 64 encoded value. This annoying extra step in the process is required so that secrets are not limited to printable character values. On Mon, Dec 19, 2016 at 10:05 PM, Leonardo Uribe wrote: > Hi > > 1.1.5 is too old. Please update to 1.1.8 or upper versions. > > See https://wiki.apache.org/myfaces/Secure_Your_Application for details. > > regards, > > Leonardo Uribe > > 2016-12-19 5:44 GMT-05:00 karthik kn : > > > Hi, > > I am using myfaces-1.1.5 and using the following state saving method > > > > javax.faces.STATE_SAVING_ > > METHODserver > > > > However,i see that the object identifier is being sent to the server as > > following > > > > > id="javax.faces.ViewState" > > value="rO0ABXVyABNbTGphdmEubGFuZy5PYmplY3Q7kM5YnxBzKWwCAAB4cAAAAAN0 > > AAEzcHQAJi9qc3AvaGxyL2FjX3N1YnNjcmliZXIvY3J0U2luZ2xlQUMuanNw" > > /> > > > > This is the serialized object identifier sent over the network > > > > We are using only https and not http. > > > > Does sending this serialized object identifier without encrypting open > any > > vulnerability which the attacker could use to his/her advantage ? > > > > -- > > ------------------------- > > Thanks & Regards > > > > Karthik.K.N > > > -- ------------------------- Thanks & Regards Karthik.K.N --089e01227936d13e16054414060f--