From d9bf0f3b5c3f9c5c1a785249b7e2d9bc04e4d576 Mon Sep 17 00:00:00 2001 From: charlie Date: Fri, 25 Nov 2016 22:05:30 +0100 Subject: [PATCH] Wijzigingen besproken tijdens de CEO meeting van Vrijdag 25 November doorgevoerd. --- report/reflection.tools.tex | 27 +++++++++++++++++++++++++-- report/v8_error.tex | 4 ++-- 2 files changed, 27 insertions(+), 4 deletions(-) diff --git a/report/reflection.tools.tex b/report/reflection.tools.tex index c03d227..8666dc1 100644 --- a/report/reflection.tools.tex +++ b/report/reflection.tools.tex @@ -5,7 +5,14 @@ Since we had most verdicts ready before a license was provided we couldn't use the tool as an initial guide trough the code. This forced us to manually check the application source which took quite some time. After the tool became available we didn't get any new insights regarding potential security risks, just more examples -of problems we already detected. +of problems we already detected. An example would be the use of the \emph{crypt()} \PHP +function which uses the outdated \emph{DES} algorithm in order to encrypt data. The +use of this function would pose a security risk and results in a failed check. Since +we where only interested in providing a verdict for each check a single occurrence of +this function allowed us to back-up our verdict. Fortify provides a full list of all +occurrences which could be used to fix the application, our verdict on the other hand +doesn't provide the developer with any information on how to fix the problem. We just +state that there is a problem. % How could they be improved? (niet echt een antwoord maar we hebben de tool ook niet echt gebruikt?) In our opinion the tool could have proved very useful in pointing out certain security @@ -18,6 +25,22 @@ focus on determining which parts of a application need to be secure and less on out actual security flaws. % How did you experience the rates and amounts of false and true positives? -TODO: feedback per groepslid, ik heb geen idee hoe iedereen dit ervaren heeft. +As far we where able to verify the tool didn't produce any false positives. +However Fortify was not able to detect all problems we found. +Fortify concluded the application passed all checks in the +Error reporting and Logging (V8) section, however we detected a number of severe +problems in this area. % How might that be improved? +Since some problems occur multiple times it might be nice if Fortify was able to +generate a clear overview of which components of the application contain detected +problems. This could be very useful in combination with the information about +components/functions which do pass the given security check. This would allow +developers to determine if they suffer from chronically malformed code +(eg. all relevant code fails the check, indicating a very serious problem throughout the entire code-base) +or a single error (eg. most relevant code passes the check except for a few isolated cases). +In the tested code-base there is a clean distinction between an installer component and the +actual web application. If the installer suffers from problems not present in +the web application and Fortify would be able to point out the specific check is +relevant to both components the company would know which team/developer needs some major +reeducation and who would be the best person to teach them. diff --git a/report/v8_error.tex b/report/v8_error.tex index 3559c50..dd7d93b 100644 --- a/report/v8_error.tex +++ b/report/v8_error.tex @@ -38,7 +38,7 @@ \begin{result} Log information is very minimal and doesn't include the date and time unless it's part of the exception message. - Only information available regarding the moment an error occoured is the date used as the log filename. + Only information available regarding the moment an error occurred is the date used as the log filename. \end{result} \item\pass{} Verify that all @@ -87,7 +87,7 @@ \begin{result} Failed login attempts, password reset, login/logout\ldots are not logged at all. - It's not possible to retreive the IP address from which a password reset has been issued. + It's not possible to retrieve the IP address from which a password reset has been issued. Only potential requests are logged even before it's verified such an action exists. \end{result} -- 2.20.1