Your SlideShare is downloading. ×
0
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Drupal security best practices
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Drupal security best practices

4,986

Published on

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,986
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
39
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • 5 steps
  • Sometimes the mythology clouds the full issueWhen we talk about security in the context of computers, our minds might tend to wander toward movies.But that’s not the full picture.So it might be helpful to back out of computers and talk about security in a general sense.
  • The thing you’re trying to get with security is freedom from fear of harm.Your person, family, belongings, money, reputation, country…Each of these things has a different protection (examples)In each case, you’re creating some barrier be it physical or social between the thing that causes you harm and the asset you’re protecting.The more barriers you put, the safer a thing can be
  • If you’re keeping some valuables at home, there may be additional safety by having a high gate, a strong lock on the door, and a safe to keep them in.This is in nice layers. When people say security is only as good as the weakest link, they’re not talking about…They are talking about how you’re protecting each entry into the house.
  • Locking up your things inside a safe, inside a house, inside a fence, on an island surrounded by lava might be really safe, but doesn’t make it easy to get those things. Writing down a password to the computer ON the computer is pretty convenient, but obviously stupid.Depending on the ease we need to get at those things we should balance the amount of security we’re willing to afford to get it. Making anything easy for one person to obtain makes it at least fractionally easier for someone else to obtain.In spite of any protections you might take, a determined crook with enough time will probably, eventually, take your valuables.
  • If you’ve got some valuable thing, you hope it won’t be stolen or broken, you you’ve still got to have some plan for when it does.It’s not just valuable stuff, either. People die. Having security for your family includes not just alleviating their fear of your death, but also alleviating their fear of what they’ll do when you die.This is just one aspect of defense in depth.In the real world, we take a lot of this stuff for granted. What people don’t seem to do very well is translate it to computer and online security.
  • So what do we need to port over from the real world to the digital?We need layers.We need to protect from every angle.We need to balance security and convenience prudently.We need a backup – just in case.Defense in depth.
  • Password strength is a simple thing, but is an obvious problem.Of the 23k people using Drupal 5 with the usage modulein January, 230 were using the password strength module to alert users to the strength of their passwords. We can beat ourselves up all day with XSRF and XSS and SQL injection, but our clients are stabbing us in the back here.One of the less immediately obvious, but more effective ways to get a password is via social engineering/hacking.Social hacking is getting to know a person or company, and integrating yourself as though you belong to obtain information you shouldn’t have.
  • MySpace phishing attack – 34k usernames and passwords81% alphanumeric,Almost 10% just letters.Another point: Passwords aren’t just a point of failure on the site you use them onThere’s little you can do to your site can prevent a user from giving away his password to someone who shouldn’t have it.
  • Things to think about passwords…People don’t care – you can set up a weak password for them; they never change it.Letters as numbers – hackers are onto you.Some good ideas – bookmark that lets you use a master password. Use mental masters.Use certs.When sharing passwords, encrypt them.Vidoop – now defunct – call and photo
  • Why is password security and other seemingly low-level security important?Because a clever hacker will abuseDon’t put a sign outside that says “door unlocked, vault within”.Poor security where its easy to fix is usually an implication of worse security where its harder to fix. It’s an invitation to hackers to try.
  • Permissions are important because after you use a password, you want to be able to do things with the system.Penn is a good example of authentication vs authorization.Just because you get into the system doesn’t mean you should see everything. Unauthenticated users are users too.Keeping secure admin passwords is important because after a site is deployed, we typically don’t remove those developer accounts.
  • A weakness that makes a threat possible. Not necessarily likely. Doesn’t encourage it. Just has potential.These are the ones we should be on the lookout for.
  • Every input should be filtered and so should every output. Should really have a good idea of what input is tainted by external influence in your system versus what data you know is clean.Always filter for what you want to have, rather than removing what you don’t want.Validation in Drupal isn’t just validating for types of values submitted, but also validating the data on its own, especially for output. Printing CCK fields is naughty.
  • Number of ways for this to work. One example.
  • Harder but more insidious.
  • Here’s what the code looks like.Don’t do this with Drupal. Use the FormAPI. Includes extra fields that prevent forged requests.
  • Drupal is mostly safe if you use the drupal functions.Drupal doesn’t use PDO – yet.Watch out for proper quotes around escaped values and IN clauses.
  • How do we test for this stuff?Automated testing suites – Acunetix.Still requires someone who knows what they’re doing at the wheel.Acunetix is a tool. Be sure your using the right tool for the right job. If you’re looking for ways to make your server more secure, Acunetix is the wrong thing.Module security audits. Surprised that there isn’t a team for this.Like to start site-wide peer code reviews. Look at template code, look at custom modules.Are you going to catch everything? No. But we can limit bad things. We can do enough that mistakes become easier to find and to avoid when we’re working.
  • Drupal issues security advisories against drupal core directly and hopefully provides timely updates.Contributed modules and themes are also announced here.Calendar? Date? On 7/29 Remotely exploitable XSS attacks were announced. Good feed to get on, especially if you want to find out about vulnerabilities before your clients see it in their logs.Be a good Drupal citizen. Report security issues properly.
  • Move from app security out to computer securityRestrict the types of files that a user can upload so that they’re not uploading file types that the server will execute. Drupal settings let you set the upload type to wildcard – naughty.File sizes. Need to work on this. Take all server space, take down server.Giving clients access to directories. Suexec. SFTP vs FTP.
  • Unix mode settings. Sticky bit used with umask to make new files take on their directory’s permissions.
  • Selecting a host for security can be tough, because it’s costly to move and maintain servers. I’m going to say “host” but that could mean your corporate internal hosting too.Hosts that are worth the extra money will do most of this for you, but be careful. There are hosts that claim to offer “fully managed” hosting, but what they really mean is that you’ll pay extra to talk to a tech than then will charge you extra for what he should have been doing all along, or tell you that it’s a service they don’t provide.Be sure that your host launches you on an up-to-date server, with an OS that you can keep updated. You don’t want to be stuck using Fedora Core 4 when they stop supporting it just because your host has some software they bought 15 years ago that helps them launch sites automatically.If you’re not regularly getting messages about your host updating things on your server, you should check into that. For each time that Drupal issues an advisory – we’re on 6.13 already – you’ve got 20 applications running that all probably require an update to keep them secure.There are things you should be doing to keep your own server secure via PHP, especially if you’re giving clients access to your server. Check out the book Essential PHP Security by Chris Shiflett, which talks about some basic settings that will prevent errant code from doing bad things. Remember, layers of protection – If someone manages to get code on your server somehow - a client? – then limiting how that code can cause harm is a good idea from the get-go.Performance can impact security. A slow server fielding a low-yield DDoS attack is going to get crushed. A fast server is going to have an easier time. Any server with mod_evasive is going to have an even easier time.Quality of your host can play a big factor in security. When you place your trust in someone who can just walk off with all of your stuff, you gotta pick hosting that’s not run from a shack. … Look for service that isn’t going down every half hour. Look for redundant systems for power, network, storage. Look for service that actually answers the phone. You want to have it and you never want to use it. It’s like insurance.
  • When all else fails.
  • Poor security has an impact on everyone. Bot-nets.In the end, it’s about keeping our risk low and making our users feel safe about using the sites we build.
  • Obviously, this is incomplete.
  • Transcript

    • 1. Security 101<br />Some of what you need to know<br />Owen Winkler<br />Rock River Star<br />http://RockRiverStar.com/<br />@ringmaster<br />
    • 2. The plan<br />What security is<br />Security on the web<br />Types of threats<br />Tools and sites<br />Impact of Security<br />
    • 3. What security is<br />
    • 4. Wikipedia Says<br />Ancient Greek “Se-Cura” – “without fear”<br />Obtain freedom from fear<br />
    • 5. Layers of Security<br />
    • 6. Convenience<br />
    • 7. What to do when my crap gets stolen…<br />Call cops<br />Replace it<br />Steal it back<br />File insurance claim<br />
    • 8. Just like real security<br />Computer security<br />
    • 9. Application Security<br />Password Strength<br />Social Engineering<br />
    • 10. Password Strength<br />http://www.wired.com/politics/security/commentary/securitymatters/2006/12/72300<br />Top 20 Passwords<br />password1, abc123, myspace1, password, blink182, qwerty1, fuckyou, 123abc, baseball1, football1, 123456, soccer, monkey1, liverpool1, princess1, jordan23, slipknot1, superman1, iloveyou1,<br />And of course… monkey<br />
    • 11. Passwords<br />People don’t care<br />L3tt3r5 a5 numb3r5<br />Master password<br />Signed logins<br />Sharing and storing<br />Two-factor!<br />
    • 12. The inverse of layered security is…<br />Site Password<br />Database password<br />Server password<br />Account password<br />Datacenter access<br />Global economic failure<br />Thermonuclear war<br />
    • 13. Permissions<br />Authentication vs. Authorization<br />See only authorized information<br />Post-deployment accounts<br />
    • 14. Vulnerabilities<br />From wikipedia: A weakness that makes a threat possible<br />Input validation<br />XSRF – Cross site request forgery<br />XSS – Cross site scripting<br />SQL-I – SQL injection<br />
    • 15. Input Validation<br />Every input & every output<br />Filter for what you want<br />Validation in Drupal<br />Ajax<br />View arguments<br />PHP execution<br />Input filters<br />check_plain() and check_markup()<br />
    • 16. XSS<br />Bad input/output filtering<br />Elevated user privileges<br />
    • 17. XSRF<br />Form on a remote site<br />Social engineering<br />
    • 18.
    • 19. SQL injection<br />Bad input filtering<br />Insert from the querystring<br />Drupalmostly safe<br />
    • 20. Testing<br />Automated testing<br />Eyeball inspection<br />Expectation<br />
    • 21. Drupal Security<br />Direct advisories – http://drupal.org/security<br />Contrib– http://drupal.org/security/contrib<br />New Reports: security@drupal.org<br />
    • 22. Server permissions<br />Computer-level security<br />User uploads<br />File types<br />Sizes<br />SFTP Directories<br />
    • 23. chmod & chown<br />Mode settings<br />Three octal values<br />UGO – User, Group, Other<br />RWX – Read (4), Write (2), Execute (1)<br />sudochmod -R ugo+r *<br />chown sets owner:group<br />sudochown -R owen:apache *<br />What is +s?<br />
    • 24. Hosting & PHP<br />Up to date<br />Patched applications<br />eval() and other evils<br />Performance<br />Reliability<br />
    • 25. Backups<br />s3cmd<br />rsync<br />Subversion!<br />Host-based recovery<br />
    • 26. Impact of Implementation<br />Why I care about you: Bot-nets<br />Appreciative users & clients<br />
    • 27. Any questions or additional topics?<br />Security 101<br />

    ×