• ASP.NET Misconfiguration: Excessive Session Timeout


    Abstract:

    An overly long authentication timeout gives attackers more time to potentially compromise user accounts.

    Explanation:

    The longer a session stays open, the larger the window of opportunity an attacker has to compromise user accounts. While a

    session remains active, an attacker may be able to brute-force a user's password, crack a user's wireless encryption key, or

    commandeer a session from an open browser. Longer authentication timeouts can also prevent memory from being released and

    eventually result in a denial of service if a sufficiently large number of sessions are created.

    Example 1: The following example shows ASP.NET MVC configured with an hour authentication timeout.

    ...

    <configuration>

    <system.web>

    <authentication>

    <forms

    timeout="60" />

    </authentication>

    </system.web>

    </configuration>

    ...

    If the timeout attribute is not specified the authentication timeout defaults to 30 minutes.

    Recommendations:

    Set an authentication timeout that is 15 minutes or less, which both allows users to interact with the application over a period of

    time and provides a reasonable bound for the window of attack.

    Example 2: The following example sets the authentication timeout to 15 minutes.

    ...

    <configuration>

    <system.web>

    <authentication>

    <forms

    timeout="15" />

    </authentication>

    </system.web>

    </configuration>

  • 相关阅读:
    JDK14的新特性:JFR,JMC和JFR事件流
    java深入理解浅拷贝和深拷贝
    jcmd:JDK14中的调试神器
    你真的了解java class name吗?
    JDK14中的java tools简介
    JDK 14的新特性:switch表达式
    JDK 14的新特性:文本块Text Blocks
    java中的内部类内部接口详解
    一文弄懂String的所有小秘密
    深入理解java的泛型
  • 原文地址:https://www.cnblogs.com/time-is-life/p/6203084.html
Copyright © 2020-2023  润新知