security - Web App that Compares User Credentials to /etc/shadow -


I secure a web application by checking the user entered with / etc / shadow to verify the user credentials I want to do it (unless there is some other solution). Is there any safe way to do this? It will not be very difficult to get it to run as root and then it will check the file and designated hash algorithm and salt string will be run, but it keeps the salt value in the hashes and reduces security. System Key

So is anybody trying utility or better and web application can be safely verified to access my UNIX credentials or / etc / shadow?

In general, the authentication will be controlled by the web server (Container Managed Authentication). For example, in Tomcat, it will be certified against an Active Directory:

  & lt; Realm className = "org.apache.catalina.realm.JNDIRealm" debug = "99" connectionName = "CN = Our User, OU = Account, DC = Domain, DC = COM" Connection Password = "S0mePassWord" connectionURL = "ldap: //192.168.1.0: 389 "Optional URL =" ldap: //192.168.1.1: 389 "Referral =" Follow "userbase =" OU = user accounts, DC = DomainAds, DC = com "UserSector =" (SAMACONNIM = "{0})" userbutry = "true" rollback = "ou = user roles, dc = domain ads, dc = com" role-name = "cn" role search = "(member = {0})" role filtration = "true" / & Gt;   

Whatever you ask is not impossible, but be careful not to give an encrypted password as a parameter because these "ps" commands can appear on some forms Are there.

For the script (you probably need more than one) that you ask, it can tell you about security problems, especially if you are not aware of all the complexities of code injection in the script (The same idea is for a SQL injection, except for the script.)

Comments

Popular posts from this blog

php - PDO bindParam() fatal error -

logging - How can I log both the Request.InputStream and Response.OutputStream traffic in my ASP.NET MVC3 Application for specific Actions? -

java - Why my included JSP file won't get processed correctly? -