-
-
Notifications
You must be signed in to change notification settings - Fork 679
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
3.5.2 doesn't seem like it is in context #1522
Comments
I would just say: Verify that the application uses framework-specific session tokens or cryptographically signed JSON Web Tokens for session management. Static API secrets and keys should be avoided. |
Probably we need to start from the question: what problem it addresses? From the text I don't read it as machine-to-machine communication specific. As a quick-fix I would get rid of phrase ", except with legacy implementations". |
It seems this section is for applications that authenticate with OpenID connect and supply a JWT to the user, instead of a random session cookie. I am not sure how "static API secrets and keys" can be an alternative to that, so in this context this requirement doesn't make sense to me. For intra-service authentication, static API secrets and keys seem acceptable to me. |
Some more details: History:
See also 2.10.1:
From Andrew's deck: From Andrew's deck: |
There has been discussion of 2.10.1 at #1032 |
I am leaning towards option 2 here. 2.10.1 seems like it is going to change slightly anyway. The history of 3.5.2 is a bit weird but I think the idea is partially covered by 2.10.1 and the rest is kind of a generic basis for session management. |
After reading it again, I still have the same question: what problem it solves? |
I think the problem it solves is that we don't have a basic level requirement which says, use session tokens not fixed values which I think is why Jim came up with:
|
@elarlang what do you think about this very basic session management requirement which Jim suggested here #1522 (comment)
|
Is the context here machine-to-machine integrations or it covers all "usual" end-users with their browsers as well? If it is machine to machine, How it's different from current 2.10.1?
For 2.10.1 there is separate issue opened: #1032 At the moment the requirement is in "Token based session management", but I can not read this category out from the requirement text. What is "framework-specific" session token? |
I think we are talking about usual end users here and that service to service is something else handled in 2.10.1.
This is a good question and I think actually we should be more consistent with the wording we are using in 3.2 so I would propose the following:
|
@elarlang do you approve this wording? |
We already have those requirements:
Why we need proposed 3.1.3? What problem it solves? Feels like some overlapping. |
Ah yeah, I think it is intended to replace 3.5.2 with a generic requirement for the need for session management so it should be this:
|
Maybe some duplication with "session tokens" Otherwise (I personally) may read it like: ... and it rises the question - why we need to sign opaque tokens, |
ok with text. no CWE? |
I cannot find a good CWE match so I would rather just get this in for now. |
Although actually 3.5.2 originally had CWE-798 which is not ideal but it is something. |
Opened #1743 to resolve |
Sorry to rehash this, but I think the original concern was that "Static API secrets and keys should be avoided." would get interpreted as almost a stand alone statement. I think this is a valid concern as while reading this, though I did eventually lean toward "this only applies to client-side sessions", there was some thought of whether or not ASVS was wanting me to ditch static API secrets m2m. |
@elarlang what do you think? |
There is more discussion about this in 2.10.1 Verify that intra-service secrets do not rely on unchanging credentials such as passwords, API keys · Issue #1032 · OWASP/ASVS. |
@set-reminder 10 minutes Josh to look at this one |
⏰ Reminder
|
Hi @craig-shony, I agree with @Sjord that the best place to discuss this would be in #1032 where I think we are already deep into this discussion :) If you don't agree, tag me with some reasoning and I can reopen this |
3.5.2 sounds more like it should either:
History:
The text was updated successfully, but these errors were encountered: