Skip to content

w3cj/node-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

To view this as a slide deck:

npm install -g reveal-md

npm start


Security

### with

CJ on Denver Devs


Agenda

  • whoami
  • Why security?
  • Security with Node.JS/Express

whoami


CJ

Lead Instructor, Sr. Full Stack Developer

at


Why security?


Show of hands:

Who here develops web applications?


Show of hands:

Who here is a security engineer?


If you are a web developer you probably don't think of yourself as a security engineer.

"Our clients don't pay us for security; they want it pretty, they want it feature-complete, and most importantly they want it done yesterday."

A Gentle Introduction to Application Security


Fact:

The second your code is deployed in production, your code is the front line of defense for that entire system and quite possibly the entire network.


Logically, that means the software you produce must be made reasonably secure.


Application Security is Every Developer's Responsibility

You don't have to be an expert.

Anything you develop with security in mind will still move the needle in your organization as well as any clients you work with.


The topics discussed in this talk are heavily influenced by the [Web Application Security Testing Cheat Sheet](https://www.owasp.org/index.php/Web_Application_Security_Testing_Cheat_Sheet) maintained by [OWASP - Open Web Application Security Project](https://www.owasp.org/index.php/Main_Page) and the [Node.js Security Checklist](https://blog.risingstack.com/node-js-security-checklist/) by RisingStack.


Security with Node.JS/Express

  • Mitigate common attacks by setting security related headers
  • Protect against brute force authentication attacks
  • Manage sessions using cookie best practices
  • Mitigate CSRF attacks
  • Validate Data to prevent XSS, SQL Injection and Command Injection
  • Ensure secure transmission by testing SSL and HSTS
  • Check NPM dependencies for known vulnerabilities

Mitigate common attacks by setting security related headers


Headers

Setting headers from the server is easy and often doesn't require any code changes. Once set, they can restrict modern browsers from running into easily preventable vulnerabilities.

OWASP Secure Headers Project


Helmet

Helmet helps you secure your Express apps by setting various HTTP headers. It's not a silver bullet, but it can help!

Helmet is a collection of 10 smaller middleware functions that set HTTP headers:


Helmet Usage

npm install -S helmet
const express = require('express');  
const helmet = require('helmet');

const app = express();

app.use(helmet());

Running app.use(helmet()) will include 7 of the 10, leaving out contentSecurityPolicy, hpkp, and noCache. You can also use each module individually.


Protect against brute force authentication attacks


Brute Force

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

via Wikipedia

https://github.com/vanhauser-thc/thc-hydra


Rate Limiting

Limiting the number of requests a user can make can protect your application from brute force attacks.


A simple and standalone middleware for express routes which attempts to mitigate brute-force attacks. It works by increasing the delay with each failed request using a Fibonacci formula. Requests are tracking via IP address and can be white-listed or reset on demand.

// Creates a new instance of our bouncer (args optional)
var bouncer = require ("express-bouncer")(500, 900000);

// Add white-listed addresses (optional)
bouncer.whitelist.push ("127.0.0.1");

// In case we want to supply our own error (optional)
bouncer.blocked = function (req, res, next, remaining) {
    res.send (429, "Too many requests have been made, " +
        "please wait " + remaining / 1000 + " seconds");
};

// Route we wish to protect with bouncer middleware
app.post ("/login", bouncer.block, function (req, res) {
    if (LoginFailed) {
        // Login failed
    } else {
        bouncer.reset (req);
        // Login succeeded
    }
});

// Clear all logged addresses
// (Usually never really used)
bouncer.addresses = { };

ratelimiter

ratelimiter is an abstract rate limiter for Node.js backed by redis.

npm install -S ratelimiter

Options

  • id - the identifier to limit against (typically a user id)
  • db - redis connection instance
  • max - max requests within duration [2500]
  • duration - of limit in milliseconds [3600000]

ratelimiter usage

Can be used as a middleware to protect ALL routes.

app.use((req, res, next) => {
  var id = req.user._id;
  var limit = new Limiter({ id: id, db: db });
  limit.get(function(err, limit){
    if (err) return next(err);

    res.set('X-RateLimit-Limit', limit.total);
    res.set('X-RateLimit-Remaining', limit.remaining - 1);
    res.set('X-RateLimit-Reset', limit.reset);

    // all good
    debug('remaining %s/%s %s', limit.remaining - 1, limit.total, id);
    if (limit.remaining) return next();

    // not good
    var delta = (limit.reset * 1000) - Date.now() | 0;
    var after = limit.reset - (Date.now() / 1000) | 0;
    res.set('Retry-After', after);
    res.send(429, 'Rate limit exceeded, retry in ' + ms(delta, { long: true }));
  });
});

Manage sessions using cookie best practices


Cookie Flags

There are several attributes that can be set on a cookie:

  • secure - this attribute tells the browser to only send the cookie if the request is being sent over HTTPS.
  • HttpOnly - this attribute is used to help prevent attacks such as cross-site scripting, since it does not allow the cookie to be accessed via JavaScript.

Cookie Scope

  • domain - this attribute is used to compare against the domain of the server in which the URL is being requested. If the domain matches or if it is a sub-domain, then the path attribute will be checked next.
  • path - in addition to the domain, the URL path that the cookie is valid for can be specified. If the domain and path match, then the cookie will be sent in the request.
  • expires - this attribute is used to set persistent cookies, since the cookie does not expire until the set date is exceeded

cookies in Express

In a newly generated express app, all options are off by default

app.use(cookieParser())

Set some sensible defaults:

app.use(cookieParser(process.env.COOKIE_SECRET, {
  secure: true,
  httpOnly: true,
  domain: process.env.DOMAIN,
  expires:
}));

cookie-parser on npm

cookie on npm


Mitigate CSRF attacks


CSRF

Cross-Site Request Forgery is an attack that forces a user to execute unwanted actions on a web application in which they're currently logged in. These attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

via OWASP

NodeGoat - an environment to learn how OWASP Top 10 security risks apply to Node.js

NodeGoat CSRF demo


csurf

Node.js CSRF protection middleware.

npm install -S csurf


csurf usage

var cookieParser = require('cookie-parser')
var csrf = require('csurf')
var bodyParser = require('body-parser')
var express = require('express')

var app = express()
app.use(cookieParser())

var csrfProtection = csrf({ cookie: true })
var parseForm = bodyParser.urlencoded({ extended: false })

app.get('/form', csrfProtection, function(req, res) {
  // pass the csrfToken to the view
  res.render('send', { csrfToken: req.csrfToken() })
})

app.post('/process', parseForm, csrfProtection, function(req, res) {
  res.send('data is being processed')
})

csurf usage

<form action="/process" method="POST">
  <input type="hidden" name="_csrf" value="{{csrfToken}}">

  Favorite color: <input type="text" name="favoriteColor">
  <button type="submit">Submit</button>
</form>

Validate Data to prevent XSS, SQL Injection and Command Injection


Always filter and sanitize user input.


Input comes from many places

  • Query parameters
  • URL path
  • PUT/POST parameters
  • Cookies
  • Headers
  • File uploads
  • Emails
  • Form fields
  • etc.

XSS

There are 2 types of XSS attacks:

Reflected Cross site scripting

The attacker injects executable JavaScript code into the HTML response with specially crafted links.

http:https://example.com/?user=<script>alert('pwned')</script>

Stored Cross site scripting

The application stores user input which is not correctly filtered. It runs within the user’s browser under the privileges of the web application.

NodeGoat Stored XSS Demo


SQL Injection

Injection of a partial or complete SQL query via user input. It can read sensitive information or be destructive as well.

select title, author from books where id=$id  

$id is coming from the user - what if the user enters 2 or 1=1? The query becomes the following:

select title, author from books where id=2 or 1=1

The easiest way to defend against these kind of attacks is to use parameterized queries or prepared statements.

If you are using PostgreSQL from Node.js then you probably using the node-postgres module. To create a parameterized query:

var q = 'SELECT name FROM books WHERE id = $1';  
client.query(q, ['3'], function(err, result) {});  

SQL Injection Testing

http:https://sqlmap.org/


Command Injection

A technique used by an attacker to run OS commands on the remote web server.

For example:

https://example.com/downloads?file=user1.txt

https://example.com/downloads?file=%3Bcat%20/etc/passwd

In this example %3B becomes the semicolon, so multiple OS commands can be run.


A few take aways for data validation:


Always filter and sanitize user input.


Always filter and sanitize user input.


Always filter and sanitize user input.


Always filter and sanitize user input.


Ensure secure transmission by testing SSL and HSTS


Secure Transmission

SSL Version, Algorithms, Key length

As HTTP is a clear-text protocol it must be secured via SSL/TLS tunnel, known as HTTPS. Nowadays high grade ciphers are normally used, misconfiguration in the server can be used to force the use of a weak cipher - or at worst no encryption.

You have to test:

  • ciphers, keys and renegotiation is properly configured
  • certificate validity

Checking for Certificate information

nmap --script ssl-cert,ssl-enum-ciphers -p 443,465,993,995 www.example.com  

Testing SSL/TLS vulnerabilities with sslyze

./sslyze.py --regular example.com:443

HSTS

The Strict-Transport-Security header enforces secure (HTTP over SSL/TLS) connections to the server. Take the following example from Twitter:

strict-transport-security:max-age=631138519

Here the max-age defines the number of seconds that the browser should automatically convert all HTTP requests to HTTPS.

Testing for it is pretty straightforward:

curl -s -D- https://twitter.com/ | grep -i Strict


Check NPM dependencies for known vulnerabilities


Any dildo can publish something to npm.

-Kyle Coberly


NPM

With great power comes great responsibility - NPM has lots of packages what you can use instantly, but that comes with a cost: you should check what you are requiring to your applications. They may contain security issues that are critical.


Node Security Platform

Check your npm dependencies for known vulnerabilities.

npm install -g nsp
nsp check # audit package.json

Snyk

Snyk is similar to the Node Security Platform, but its aim is to provide a tool that can not just detect, but fix security related issues in your codebase.

npm install -g snyk
snyk test # audit node_modules directory

Review


Mitigate common attacks by setting security related headers


Protect against brute force authentication attacks


Manage sessions using cookie best practices


Mitigate CSRF attacks


Validate Data to prevent XSS, SQL Injection and Command Injection


Ensure secure transmission by testing SSL and HSTS


Check NPM dependencies for known vulnerabilities


Final Thoughts


Knowing is half the battle!


Application Security is Every Developer's Responsibility

This doesn't mean you have to be an expert. You can take one step forward on the path towards expertise and stop, and it will still move the needle in your organization as well as any clients you work with.


Security is a mindset, checklist/Top 10 is a place to start, but don't stop there!


Resources


is Hiring!

gjobs.link/ByTeam


Thank you!

Security

##### with

CJ on Denver Devs

About

Slides/Notes from my talk on Security Best Practices with Node.js https://www.youtube.com/watch?v=qBLgykeA3Mo

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published