- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
Now this is the best wtf in ages..... Has everything on it. Incapable manager, hardcoded values, pointless technology used, etc.....
Love it ;)
First?
Admin
I love it. What AP module is complete without a code checkout report?
:-)
--doc0tis
Admin
Wait, wait , wait!!
Do they have webservices to destroy companies ?
Admin
I have to point out the obvious. They invented REST.
Admin
What an interesting sensation... I think my brain hiccupped when I read that sentence.
Admin
Restricted Environmental Stimulation Technique? Yeah, that would explain a lot.
Admin
Although the authentication scheme is flimsy at best, threatening to make widows out of attacker's wives kept all but the bravest / loneliest hackers at bay...
[Note from Alex - fixed typo =-)]
Admin
He knew what he was going!
Admin
Quite a few typos the last few days. Wonder what's up?
Admin
That's genius!
Admin
Admin
Given what Alex posts, can you imagine what he reads that we never see? It's a miracle he can sit up straight...
Admin
Well, how else would the developers get the per-bug-fix bonus they were promised in the interview? Come to think of it, I'm still waiting on my check...
Admin
Hey I have an idea. Maybe he should just hard code everyone’s usernames and passwords in to this if statement.
Admin
Oh I get it, the WTF is that there aren't any capital letters in the secure passkey, right?
Admin
Oh I get it, the WTF is that there aren't any capital letters in the secure passkey, right?
Admin
I have a better idea - hard code them into the Javascript! Rely on the browser to tell you if the person has authenticated or not. With the added bonus that you're exposing your userids and passwords to anybody who looks at the page source.
Admin
I think this sentence should qualify as a representive line. So what if its not source code.
Admin
I can't quite decide if I would wish that that monstrosity was hosted on SSL, or if it wasn't. If it wasn't, at least it would be blatantly obvious to the first network sniff what a stupendous WTF this is... but then there's the danger that the first person to do a network sniff *ahem* doesn't tell anyone.
Argh! Damn this thing - it tempts me to try to take it seriously!
Admin
people either look good or *are* good.
this doofus is the former
how secure is that and his *promotion* to management was deserved 'eh
Admin
Apparently, he didn't know whether he was coming or doing.
Admin
Security is only needed for applications that actually do something. If the rest of the design is as "good" as the security part, I seriously doubt if anything will actually happen. Remember this is the same "genius" who fixed problems in release without every checking in any code. Maybe he could even design a codeless architecture to implement all this.
Admin
Funny how people can reinvent Kerberos, while totally missing the mark.
Admin
Admin
By the way, the second best solution is to write a wsdl that contains the password. (I had to write a client for such a webservice once.)
Admin
Fantastic, just splended... hahaha, just splended :D
Admin
I work with someone who used to be a developer, but "failed upward". Not only did his solutions hardly ever work consistently, but his design practices were, well, terrible. His code was generally a uncommented mess of hard-coded global variables with a total lack of any sort of object oriented design, or any distinguishable design pattern for that matter, with no traces of any sort of error handling. So he has his new position and decides to start exercising some of his new found authority. Our reporting department had been complaining that some of their reports take too long to generate. Although this is to be expected with multi-hundred-thousand row reports consisting of sometimes a decade's worth of production data, we did what we could to optimize our reporting tools.
Ultimately, what it boiled down to was the memory limits for ISS worker processes on 32-bit platforms. The obvious solution was to upgrade our aging reporting server to a more robust 64-bit platform. So when the aforementioned individual called a meeting with the reporting department to discuss possible solutions we brought that suggestion to the table. Person X's response to our suggestion was classic. Mind you that this person was promoted all the way to the top of the development chain.
developer y: "We did some research and believe that upgrading to a 64-bit platform will solve our problems by extending the memory limitations for ISS worker processes"
manager x: "What are you talking about?! 64-bit? That doesn't even exist! Come back with something realistic."
developer y: "Isn't your lab top 64-bit?"
manager x: "No, and I think I would know."
developer y: "See that sticker right there next to your keyboard? Doesn't that say 64-bit?"
manager x: "Well so what, I don't see how improved graphics could help our reporting problems"
Admin
To be fair, it seems like this system is only for internal use. If that is the case, they shouldn't have to worry about someone packet sniffing the password; if someone who shouldn't be inside the network is inside the network, they have other problems. Of course, having a password in the first place would then be rather pointless.
Okay, I'll stop trying to apologize for this sorry excuse for an engineer.
Admin
So what? the password is hardcoded, stored in code, and passed in the clear. It provides no real security either - the only reason to have it at all is to force developers to talk to you before using your service.
/knowhutimean
Admin
Because the system is for internal use, they *should* worry about packet sniffing. I'm willing to bet that most successful security hacks happen on the inside. How many times have you played with Ethreal/Wireshark at your house? It's much more fun at work.
The larger the company, the more likely you are to get a disgrunteld employee who acts on their malicious impulses. I used to work in Loss Prevention at a major retail store, and our estimates were that 80% of all our "loss" was internal. My job was to watch the employees first and the customers second.
Admin
I didn't know there was a 64 bit Etch-a-sketch.
Admin
I think that's the point when you ask to have a meeting with the reports people, minus person X, and explain them that he's actually become feebleminded, and that the only reason he's kept around is because of some dirty laundry. Shh! Don't tell other people. But you saw what he did in there.
Admin
The real WTF is: Steve can now deny responsibility because it was secure until the submitter leak the company's secret authentication scheme. Now if only he/she tell us the actual identity of the company. ;)
Billant!
CAPTCHA = paula
Admin
We can learn something significant from this, guys. Steve, despite his incompetence, managed to rise all the way to the top.
He must be doing something right. Me, if I have a guy like that as a colleague I'll watch closely what he'll do. So the next time it's my turn, I can do the same tactics, with clear conscience, because I know that my technical skill will actually back me up.
Admin
>No one bought it, and that's why it was so funny. Well, funny until he was promoted to management.
I don't buy it... if no one believed his charades, then who promoted him to management? I'm guessing he was rewarded for his dedication, ability to rally the troops to fix critical issues, etc.
Admin
Either it was an exaggeration, or Steve was actually _that_ good in making the right impression to the right people.
Admin
Good thinking batman! We all know that http isn't really secure so do the password validation on the client side and you never have to send passwords over http.
Admin
From Wikipedia, the free encyclopedia
Irony is a literary or rhetorical device in which there is a gap or incongruity between what a speaker or a writer says, and what is generally understood (either at the time, or in the later context of history). Irony may also arise from a discordance between acts and results, especially if it is striking, and known to a later audience. A certain kind of irony may result from the act of pursuing a desired outcome, resulting in the opposite effect, but again, only if this is known to a third party. In this case the aesthetic arises from the realization that an effort is sharply at odds with an outcome, and that in fact the very effort has been its own undoing.
Admin
Any fool knows you can't run 64-bit worker processes in a zero-gravity environment, sheesh.
Admin
WTF! They are not using the correct casing rules!
public string WebRequest(string requestXml, string username, string passkey)
should be
;)
Admin
I am web developper, and I have no idea the right way to implement that.
But I think can something about that:
I think this idea is weak because you need to store the user passwords at clientside and at serverside. Is better to forget passwords and only store a hash of the original password serverside :I. Other problem: you need to do 2 calls to get the data, and the server need some sort of session, and the result can be man in the midle weak.
How to enhance that?
Admin
"32foi$^" ? That's french for "32 time$^".
Admin
Got this ad at the end of the article :
Enterprise security software that gets theats before get to you
Symantec
haha !
Still waiting symantec to kick incapable manager out.
Admin
Are you saying that this system should be operated from outer space? So the whole universe can sniff that password-packet? :-)
Admin
>>This is a little off topic, but...
Sorry, this was directed to Anonymous who asked the question about password hashing. Quote function didn't work.
Admin
It that case, using web services all over the place was not a bad choice. It is a good excuse to buy many licenses of Windows Server because Pro licenses cannot serve more than 10 users at a time. Usually VPs evaluates the importance of a manager by how much they spend.
Admin
Ever heard of switches?
Switch your adaptor to promiscuous and two things happen at our company,
1) You find out you cant actually sniff anything not going to or from your local box
2) You find my boot up your arse, and a P45 in the post for breaking computer use policy
And the answer to 'clear text authentication issues' arent javascript crpyto libraries, hash functions or anything similar. Its called SSL/TLS, its a standard and its trivial to layer over HTTP.
CAPTCHA: giggity giggity giggity ITS QUAQMIRE
Admin
Yes.
And hard-coding each password to be a ROT-13 of the username would make it completely secure because you would not be relying on one global password! </sarcasm>
Admin
A classic example of The Peter Principle !
Admin
Web services, not web site.