[prev in list] [next in list] [prev in thread] [next in thread] 

List:       webappsec
Subject:    RE: Web app based on .net - best practice?
From:       "Harbar, Spencer" <spencer.harbar () dns ! co ! uk>
Date:       2003-04-24 9:24:57
[Download RAW message or body]


you definitely want to put your business logic on a different subnet seperated by a \
firewall...


you could check out the Microsoft prescriptive guidance for ASP.NET:

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/secnetlpMSDN.asp


This has extensive coverage of the areas you mention. 

It is possible to configure DCOM/COM+ to use one RPC port per application, in \
addition to 135. This gives you a practical and measurable way to let RPC through \
firewalls.

Check out http://www.gotdotnet.com/team/rojacobs/samples/dev359.zip for sample code \
for this.

However, if you are using .NET why not use Web Services and therefore HTTP as the \
inter-zone communication channel?  Or are you restricted by windows 2000 / legacy COM \
components?

With Windows 2003 Server you can expose legacy COM+ applications as Web Services \
simply by checking a box in the COM+ GUI.

hth
Spence


-----Original Message-----
From: Mads Rasmussen [mailto:mads@opencs.com.br] 
Sent: 23 April 2003 14:42
To: webappsec@securityfocus.com


Imagine I have a .net based application

I thought it would be a good idea to have the presentation layer (asp) in a DMZ and \
the business layer (components in VB and C#) in a safe site behind a firewall. The \
communication in between would take place with RPC calls. I know that RPC is not \
considered secure but we have a firewall in between the DMZ and the safe site (not a \
guarantee things work out, I know)

I wondered what Microsoft says about the division of the layers, is there a \
recommendation or some kind of best practice for something like this?

Do any know of pointers to information about this? 

My concern is that if the whole application was based in the DMZ, it would be hard to \
control injections and stuff like that. With the division we can control (somewhat) \
what calls goes to the safe site (business layer).

I would love to hear opinions on this matter

Thanks,

Mads

--
Mads Rasmussen
Consultant
Av. Engenheiro Luis Carlos Berrini, 550
11º. Andar - conj. 111 - Brooklin - S.P. Brasil
+55 11 3345-2525 Phone
+55 11 3345-2526 Fax
http://www.opencs.com.br/
 
 
 
 
 
 
 
 
 





**********************************************************************
We are exhibiting at InfoSecurity Europe 2003, Olympia - Tuesday 29th
April to Thursday 1st May. 
Come and see us on Stand 670 (with Microsoft) where we will be 
discussing Application Security.

**********************************************************************

**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the sender immediately and then delete from your system.  

This footnote also confirms that this email message has been swept 
for the presence of known computer viruses.

**********************************************************************


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic