-
-
Notifications
You must be signed in to change notification settings - Fork 207
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potential Security Issues #172
Comments
I will have to look it up again, but I think I recall the 2019 NIST guidelines recommending to give useful message like these in favor or more cryptic messages they previously recommended. |
And, to be fair, with the 1 billion+ hacked databases having been released freely on the internet, there's a pretty good likelihood they already know the email exists. :) |
You just need to change |
@Ihabafia It’s not the issue how to do it. The issue here is what’s the proper way to be done and if any changes are required to be done those should be merged to the official repository |
+1 for the initial post. |
I wouldn't be very concerned about this. User experience is also very important.
IMO if someone has specific needs for security, he should edit language files and flow in the controller by himself. The only thing we can think about here is more advanced throttling. Because right now I don't think we take advantage of it everywhere. That's my two cents. |
agree with @michalsn and @lonnieezell |
I think it is something that should be extended to sign up too, I explain it better:
It is just an opinion, clearly, considering it is something easy to edit no problem in any case, I'll always chose that direction to protect user privacy as possible. |
So many pros and cons related to this. So maybe the best way will be to have parameter in config so that it can be used in both ways |
I've been slammed by other stuff lately so haven't had the chance to dig through the pages and pages of acedemia of the current NIST recommendations, but I'm positive when I was going through them previously that user experience won over in the latest recommendations. Since all it requires is changing out a language string, it's simple enough for someone to customize on their own app. I don't think we need any config checks on this.
I don't want this in the core, as years of looking at logs tells me there are way too many instances of bots doing misc automated attacks that it would scare off users and make them feel that the app you're building isn't a safe app, when it's irrelevant to the safety built in. However, I do think adding triggering events at register, login, forgot password, etc makes sense so the app can be extended easily and customized. @Vizzielli would you care to pull that out into it's own issue? |
I agree with @lonnieezell the more guidance for the user to correct errors the better. About robot crawling and brute force attacks should be an implementation of firewel, where you can discern a number of attempts per time related to an IP. this may be a complementary module in the future. |
There are two issues I'm noticing
This allows bots/exploits to check if username exist easily
This allows bots to check which emails are valid and can be used for many bad things not only for exploiting the login. One example is checking if email is being used when crawling mail lists for spam purposes. This should be reworked so that form always return message in some sort of "You will get an email shortly if the address exist in our system."
The text was updated successfully, but these errors were encountered: