To view this as a slide deck:
npm install -g reveal-md
npm start
### with Security
[email protected]
CJ on Denver Devs
Agenda
- whoami
- Why security?
- Security with Node.JS/Express
whoami
Why security?
Show of hands:
Who here develops web applications?
Show of hands:
Who here is a security engineer?
If you are a web developer you probably don't think of yourself as a security engineer.
"Our clients don't pay us for security; they want it pretty, they want it feature-complete, and most importantly they want it done yesterday."
A Gentle Introduction to Application Security
Fact:
The second your code is deployed in production, your code is the front line of defense for that entire system and quite possibly the entire network.
Logically, that means the software you produce must be made reasonably secure.
Application Security is Every Developer's Responsibility
You don't have to be an expert.
Anything you develop with security in mind will still move the needle in your organization as well as any clients you work with.
https://www.owasp.org/index.php/Web_Application_Security_Testing_Cheat_Sheet) maintained by [OWASP - Open Web Application Security Project](https://www.owasp.org/index.php/Main_Page) and the [Node.js Security Checklist](https://blog.risingstack.com/node-js-security-checklist/) by RisingStack.
The topics discussed in this talk are heavily influenced by the [Web Application Security Testing Cheat Sheet](Security with Node.JS/Express
- Mitigate common attacks by setting security related headers
- Protect against brute force authentication attacks
- Manage sessions using cookie best practices
- Mitigate CSRF attacks
- Validate Data to prevent XSS, SQL Injection and Command Injection
- Ensure secure transmission by testing SSL and HSTS
- Check NPM dependencies for known vulnerabilities
Mitigate common attacks by setting security related headers
Headers
Setting headers from the server is easy and often doesn't require any code changes. Once set, they can restrict modern browsers from running into easily preventable vulnerabilities.
Helmet
Helmet helps you secure your Express apps by setting various HTTP headers. It's not a silver bullet, but it can help!
Helmet is a collection of 10 smaller middleware functions that set HTTP headers:
- contentSecurityPolicy for setting Content Security Policy
- dnsPrefetchControl controls browser DNS prefetching
- frameguard to prevent clickjacking
- hidePoweredBy to remove the X-Powered-By header
- hpkp for HTTP Public Key Pinning
- hsts for HTTP Strict Transport Security
- ieNoOpen sets X-Download-Options for IE8+
- noCache to disable client-side caching
- noSniff to keep clients from sniffing the MIME type
- xssFilter adds some small XSS protections
Helmet Usage
npm install -S helmet
const express = require('express');
const helmet = require('helmet');
const app = express();
app.use(helmet());
Running app.use(helmet())
will include 7 of the 10, leaving out contentSecurityPolicy
, hpkp
, and noCache
. You can also use each module individually.
Protect against brute force authentication attacks
Brute Force
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.
https://github.com/vanhauser-thc/thc-hydra
Rate Limiting
Limiting the number of requests a user can make can protect your application from brute force attacks.
express-bouncer
A simple and standalone middleware for express routes which attempts to mitigate brute-force attacks. It works by increasing the delay with each failed request using a Fibonacci formula. Requests are tracking via IP address and can be white-listed or reset on demand.
// Creates a new instance of our bouncer (args optional)
var bouncer = require ("express-bouncer")(500, 900000);
// Add white-listed addresses (optional)
bouncer.whitelist.push ("127.0.0.1");
// In case we want to supply our own error (optional)
bouncer.blocked = function (req, res, next, remaining) {
res.send (429, "Too many requests have been made, " +
"please wait " + remaining / 1000 + " seconds");
};
// Route we wish to protect with bouncer middleware
app.post ("/login", bouncer.block, function (req, res) {
if (LoginFailed) {
// Login failed
} else {
bouncer.reset (req);
// Login succeeded
}
});
// Clear all logged addresses
// (Usually never really used)
bouncer.addresses = { };
ratelimiter
ratelimiter is an abstract rate limiter for Node.js backed by redis.
npm install -S ratelimiter
Options
id
- the identifier to limit against (typically a user id)db
- redis connection instancemax
- max requests withinduration
[2500]duration
- of limit in milliseconds [3600000]
ratelimiter usage
Can be used as a middleware to protect ALL routes.
app.use((req, res, next) => {
var id = req.user._id;
var limit = new Limiter({ id: id, db: db });
limit.get(function(err, limit){
if (err) return next(err);
res.set('X-RateLimit-Limit', limit.total);
res.set('X-RateLimit-Remaining', limit.remaining - 1);
res.set('X-RateLimit-Reset', limit.reset);
// all good
debug('remaining %s/%s %s', limit.remaining - 1, limit.total, id);
if (limit.remaining) return next();
// not good
var delta = (limit.reset * 1000) - Date.now() | 0;
var after = limit.reset - (Date.now() / 1000) | 0;
res.set('Retry-After', after);
res.send(429, 'Rate limit exceeded, retry in ' + ms(delta, { long: true }));
});
});
Manage sessions using cookie best practices
Cookie Flags
There are several attributes that can be set on a cookie:
secure
- this attribute tells the browser to only send the cookie if the request is being sent over HTTPS.HttpOnly
- this attribute is used to help prevent attacks such as cross-site scripting, since it does not allow the cookie to be accessed via JavaScript.
Cookie Scope
domain
- this attribute is used to compare against the domain of the server in which the URL is being requested. If the domain matches or if it is a sub-domain, then the path attribute will be checked next.path
- in addition to the domain, the URL path that the cookie is valid for can be specified. If the domain and path match, then the cookie will be sent in the request.expires
- this attribute is used to set persistent cookies, since the cookie does not expire until the set date is exceeded
cookies in Express
In a newly generated express app, all options are off by default
app.use(cookieParser())
Set some sensible defaults:
app.use(cookieParser(process.env.COOKIE_SECRET, {
secure: true,
httpOnly: true,
domain: process.env.DOMAIN,
expires:
}));
Mitigate CSRF attacks
CSRF
Cross-Site Request Forgery is an attack that forces a user to execute unwanted actions on a web application in which they're currently logged in. These attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.
NodeGoat - an environment to learn how OWASP Top 10 security risks apply to Node.js
csurf
Node.js CSRF protection middleware.
npm install -S csurf
csurf usage
var cookieParser = require('cookie-parser')
var csrf = require('csurf')
var bodyParser = require('body-parser')
var express = require('express')
var app = express()
app.use(cookieParser())
var csrfProtection = csrf({ cookie: true })
var parseForm = bodyParser.urlencoded({ extended: false })
app.get('/form', csrfProtection, function(req, res) {
// pass the csrfToken to the view
res.render('send', { csrfToken: req.csrfToken() })
})
app.post('/process', parseForm, csrfProtection, function(req, res) {
res.send('data is being processed')
})
csurf usage
<form action="/process" method="POST">
<input type="hidden" name="_csrf" value="{{csrfToken}}">
Favorite color: <input type="text" name="favoriteColor">
<button type="submit">Submit</button>
</form>
Validate Data to prevent XSS, SQL Injection and Command Injection
Always filter and sanitize user input.
Input comes from many places
- Query parameters
- URL path
- PUT/POST parameters
- Cookies
- Headers
- File uploads
- Emails
- Form fields
- etc.
XSS
There are 2 types of XSS attacks:
Reflected Cross site scripting
The attacker injects executable JavaScript code into the HTML response with specially crafted links.
http://example.com/?user=<script>alert('pwned')</script>
Stored Cross site scripting
The application stores user input which is not correctly filtered. It runs within the user’s browser under the privileges of the web application.
SQL Injection
Injection of a partial or complete SQL query via user input. It can read sensitive information or be destructive as well.
select title, author from books where id=$id
$id
is coming from the user - what if the user enters 2 or 1=1? The query becomes the following:
select title, author from books where id=2 or 1=1
The easiest way to defend against these kind of attacks is to use parameterized queries or prepared statements.
If you are using PostgreSQL from Node.js then you probably using the node-postgres module. To create a parameterized query:
var q = 'SELECT name FROM books WHERE id = $1';
client.query(q, ['3'], function(err, result) {});
SQL Injection Testing
Command Injection
A technique used by an attacker to run OS commands on the remote web server.
For example:
https://example.com/downloads?file=user1.txt
https://example.com/downloads?file=%3Bcat%20/etc/passwd
In this example %3B becomes the semicolon, so multiple OS commands can be run.
A few take aways for data validation:
Always filter and sanitize user input.
Always filter and sanitize user input.
Always filter and sanitize user input.
Always filter and sanitize user input.
Ensure secure transmission by testing SSL and HSTS
Secure Transmission
SSL Version, Algorithms, Key length
As HTTP is a clear-text protocol it must be secured via SSL/TLS tunnel, known as HTTPS. Nowadays high grade ciphers are normally used, misconfiguration in the server can be used to force the use of a weak cipher - or at worst no encryption.
You have to test:
- ciphers, keys and renegotiation is properly configured
- certificate validity
Checking for Certificate information
nmap
nmap --script ssl-cert,ssl-enum-ciphers -p 443,465,993,995 www.example.com
Testing SSL/TLS vulnerabilities with sslyze
sslyze
./sslyze.py --regular example.com:443
HSTS
The Strict-Transport-Security
header enforces secure (HTTP over SSL/TLS) connections to the server. Take the following example from Twitter:
strict-transport-security:max-age=631138519
Here the max-age defines the number of seconds that the browser should automatically convert all HTTP requests to HTTPS.
Testing for it is pretty straightforward:
curl -s -D- https://twitter.com/ | grep -i Strict
Check NPM dependencies for known vulnerabilities
Any dildo can publish something to npm.
-Kyle Coberly
NPM
With great power comes great responsibility - NPM has lots of packages what you can use instantly, but that comes with a cost: you should check what you are requiring to your applications. They may contain security issues that are critical.
Node Security Platform
Check your npm dependencies for known vulnerabilities.
npm install -g nsp
nsp check # audit package.json
Snyk
Snyk is similar to the Node Security Platform, but its aim is to provide a tool that can not just detect, but fix security related issues in your codebase.
npm install -g snyk
snyk test # audit node_modules directory
Review
Mitigate common attacks by setting security related headers
Protect against brute force authentication attacks
Manage sessions using cookie best practices
Mitigate CSRF attacks
Validate Data to prevent XSS, SQL Injection and Command Injection
Ensure secure transmission by testing SSL and HSTS
Check NPM dependencies for known vulnerabilities
Final Thoughts
Knowing is half the battle!
Application Security is Every Developer's Responsibility
This doesn't mean you have to be an expert. You can take one step forward on the path towards expertise and stop, and it will still move the needle in your organization as well as any clients you work with.
Security is a mindset, checklist/Top 10 is a place to start, but don't stop there!
Resources
- reveal-md for slides
- Animations
- Node.js Security Checklist
- OWASP - Open Web Application Security Project
- Web Application Security Testing Cheat Sheet
- NodeGoat
- Node.js Security Tips
- A Gentle Introduction to Application Security
- Top Overlooked Security Threats To Node.js Web Applications