<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pparrend</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pparrend"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Pparrend"/>
		<updated>2026-04-26T15:05:39Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=55594</id>
		<title>Project Information:template OpenSign Server Project - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=55594"/>
				<updated>2009-02-27T11:06:33Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
* Client tool to generate RSA key pair and request signing certificate by return via a secure connection, secure connection will authenticate user after a dedicated registration process and also use mutual authentication SSL to avoid man-in-the-middle - returning certificate to user in real time. Registered developer can then submit their SPC online to verify the SPC.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; ok&lt;br /&gt;
&lt;br /&gt;
* Client tool to download software that will do a proper verification on the software against the code signing service&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; code download and verification is not available in the OSSJClient. Verification of the certificate is therefore performed&lt;br /&gt;
independently of the signed code (one step is missing in the process).&lt;br /&gt;
&lt;br /&gt;
* Website interface for the code signing service&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; ok&lt;br /&gt;
&lt;br /&gt;
* Set of Admin tools to manage the code signing service, user and certificate repository&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; available, but completeness of features should be validated&lt;br /&gt;
&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; User documentation has been completed.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; The demonstration could be more explicit related to the integration of the tools in the software deployment process.&lt;br /&gt;
The role of entities (certificate, CSR) could be explained more precisely, so as to enable developpers with limited &lt;br /&gt;
security knowledge to use the tool. For instance: integrate the documentation (opendsign-concept.doc ...) in the&lt;br /&gt;
demo slides.&lt;br /&gt;
&lt;br /&gt;
Documentation in the code repository contains the original design doc rather than the current dev/use documentation.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''NOTE''': the deliverables are tagged in the project definition as 'idealized result', and were since the beginning identified&lt;br /&gt;
as an ambitious goal. The project delivers running tools and documentation, which do not fullfil these expectations,&lt;br /&gt;
but provide developpers with usefull and simple to use tools. The percentage are relative to the original definition.&lt;br /&gt;
&lt;br /&gt;
* Client tool to generate RSA key pair and request signing certificate by return via a secure connection, secure connection will authenticate user after a dedicated registration process and also use mutual authentication SSL to avoid man-in-the-middle - returning certificate to user in real time. Registered developer can then submit their SPC online to verify the SPC.&lt;br /&gt;
&lt;br /&gt;
100 %&lt;br /&gt;
&lt;br /&gt;
* Client tool to download software that will do a proper verification on the software against the code signing service&lt;br /&gt;
&lt;br /&gt;
50%&lt;br /&gt;
&lt;br /&gt;
* Website interface for the code signing service&lt;br /&gt;
90 %&lt;br /&gt;
&lt;br /&gt;
* Set of Admin tools to manage the code signing service, user and certificate repository&lt;br /&gt;
&lt;br /&gt;
70 %&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''First comments''':&lt;br /&gt;
&lt;br /&gt;
* it would be nice it it would be possible to simply download and run the code&lt;br /&gt;
for the server and the client (I have made some tests under linux, this seems not to be the case for the latter releases available on the project web page)&lt;br /&gt;
* available scripts for starting both under MS win &amp;amp; linux, with default config&lt;br /&gt;
* available user documentation: what can I do with each tool, how (for instance under the form of a '5 minutes introduction' and reference list of available functions) ?&lt;br /&gt;
* is the C# code available for download and execution ?&lt;br /&gt;
* it would be nice if the 'trunk' would be documented in a way that let the user know:&lt;br /&gt;
- how to compile everything (without needing to install libraries from the web) ?&lt;br /&gt;
&lt;br /&gt;
- how to run the server and clients (a global 'readme' file is missing).&lt;br /&gt;
&lt;br /&gt;
* Moreover, the 'opensign-design' document could be completed. User documentation mqkes this less urgent.&lt;br /&gt;
&lt;br /&gt;
'''Final Review'''&lt;br /&gt;
&lt;br /&gt;
Extending the OSSJClient with code download and verification feature would provide a important added value for&lt;br /&gt;
a reasonnable work overhead. It could therefore be done in priority.&lt;br /&gt;
&lt;br /&gt;
Please see other omments for further remarks.&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None (validated in previous review).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
    * Add a common About Box or help menu in the tool itself&lt;br /&gt;
          o (which lists name of tool, author, e-mail address of author, current version number and/or release date) &lt;br /&gt;
&lt;br /&gt;
Help is provided. Informations related to the authors are not.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Be reasonably easy to use&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; OK&lt;br /&gt;
&lt;br /&gt;
* Include online documention built into tool (based on required user documentation)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; User documentation is made available.&lt;br /&gt;
	&lt;br /&gt;
* Include build scripts that facilitate building the application from source (Goal: One-click build)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; Completeness to be checked. Currently build tools are dependent of development environment (maven for Java; these environments &lt;br /&gt;
should be specified).&lt;br /&gt;
	&lt;br /&gt;
* Publicly accessible bug tracking system established, ideally at the same place as the source code repository (e.g., at Google code, or Sourceforge)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO, as far as I know&lt;br /&gt;
	&lt;br /&gt;
* Be run through Fortify Software's open source review (if appropriate) and FindBugs.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; TODO, or include reports	&lt;br /&gt;
	&lt;br /&gt;
* C/C++ apps (if we have any) should consider being run through Coverity's open source review. Coverity also accepts submissions for open source Java applications.&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO, or include reports&lt;br /&gt;
	&lt;br /&gt;
* When approved to be Release Quality: Update the link to it on: the OWASP Project page and update its project quality tag on its project page to be Release Quality. &lt;br /&gt;
&lt;br /&gt;
'''Recommendations''':&lt;br /&gt;
&lt;br /&gt;
* Conference style Powerpoint presentation that describes the use and status of the tool. (This could be used by others to discuss the tool at OWASP Chapter meetings, serve as easy to review offline documentation, etc.)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; available&lt;br /&gt;
	&lt;br /&gt;
* UAT pass on functionality of the tool&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO&lt;br /&gt;
	&lt;br /&gt;
* Developer documents any limitations &lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; Roadmap for future development is provided.&lt;br /&gt;
&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Documentation update has been performed.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project_-_Assessment_Frame&amp;diff=53355</id>
		<title>Category:OWASP OpenSign Server Project - Assessment Frame</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_OpenSign_Server_Project_-_Assessment_Frame&amp;diff=53355"/>
				<updated>2009-02-08T16:25:53Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP OpenSign Server Project|Click here to return to project's main page]].&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP OpenSign Server Project (Online code signing and integrity verification service for open source community)''' &lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS - OWASP Summer of Code 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;[[User:Philipp Potisk|'''Philipp Potisk''']]&amp;lt;br&amp;gt;[mailto:techierebel@yahoo.co.uk Richard Conway] &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;[[:User:Pparrend|'''Pierre Parrend''']]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;[[:User:Gary.m.burns|'''Gary Burns''']]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;Non applicable&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - Self Evaluation - A|Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C|First Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project 50 Review Second Review E|Second Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Self Evaluation - B|Self-Evaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Beta Quality'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - First Reviewer - D|First Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Beta Quality'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template OpenSign Server Project - Final Review - Second Reviewer - F|Second Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=53339</id>
		<title>Project Information:template OpenSign Server Project - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=53339"/>
				<updated>2009-02-08T14:29:37Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
* Client tool to generate RSA key pair and request signing certificate by return via a secure connection, secure connection will authenticate user after a dedicated registration process and also use mutual authentication SSL to avoid man-in-the-middle - returning certificate to user in real time. Registered developer can then submit their SPC online to verify the SPC.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; ok&lt;br /&gt;
&lt;br /&gt;
* Client tool to download software that will do a proper verification on the software against the code signing service&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; code download and verification is not available in the OSSJClient. Verification of the certificate is therefore performed&lt;br /&gt;
independently of the signed code (one step is missing in the process).&lt;br /&gt;
&lt;br /&gt;
* Website interface for the code signing service&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; ok&lt;br /&gt;
&lt;br /&gt;
* Set of Admin tools to manage the code signing service, user and certificate repository&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; available, but completeness of features should be validated&lt;br /&gt;
&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; The demonstration could be more explicit related to the integration of the tools in the software deployment process.&lt;br /&gt;
The role of entities (certificate, CSR) could be explained more precisely, so as to enable developpers with limited &lt;br /&gt;
security knowledge to use the tool. For instance: integrate the documentation (opendsign-concept.doc ...) in the&lt;br /&gt;
demo slides.&lt;br /&gt;
&lt;br /&gt;
Documentation in the code repository contains the original design doc rather than the current dev/use documentation.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''NOTE''': the deliverables are tagged in the project definition as 'idealized result', and were since the beginning identified&lt;br /&gt;
as an ambitious goal. The project delivers running tools and documentation, which do not fullfil these expectations,&lt;br /&gt;
but provide developpers with usefull and simple to use tools. The percentage are relative to the original definition.&lt;br /&gt;
&lt;br /&gt;
* Client tool to generate RSA key pair and request signing certificate by return via a secure connection, secure connection will authenticate user after a dedicated registration process and also use mutual authentication SSL to avoid man-in-the-middle - returning certificate to user in real time. Registered developer can then submit their SPC online to verify the SPC.&lt;br /&gt;
&lt;br /&gt;
100 %&lt;br /&gt;
&lt;br /&gt;
* Client tool to download software that will do a proper verification on the software against the code signing service&lt;br /&gt;
&lt;br /&gt;
50%&lt;br /&gt;
&lt;br /&gt;
* Website interface for the code signing service&lt;br /&gt;
90 %&lt;br /&gt;
&lt;br /&gt;
* Set of Admin tools to manage the code signing service, user and certificate repository&lt;br /&gt;
&lt;br /&gt;
70 %&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''First comments''':&lt;br /&gt;
&lt;br /&gt;
* it would be nice it it would be possible to simply download and run the code&lt;br /&gt;
for the server and the client (I have made some tests under linux, this seems not to be the case for the latter releases available on the project web page)&lt;br /&gt;
* available scripts for starting both under MS win &amp;amp; linux, with default config&lt;br /&gt;
* available user documentation: what can I do with each tool, how (for instance under the form of a '5 minutes introduction' and reference list of available functions) ?&lt;br /&gt;
* is the C# code available for download and execution ?&lt;br /&gt;
* it would be nice if the 'trunk' would be documented in a way that let the user know:&lt;br /&gt;
- how to compile everything (without needing to install libraries from the web) ?&lt;br /&gt;
&lt;br /&gt;
- how to run the server and clients (a global 'readme' file is missing).&lt;br /&gt;
&lt;br /&gt;
* Moreover, the 'opensign-design' document could be completed.&lt;br /&gt;
&lt;br /&gt;
'''Final Review'''&lt;br /&gt;
&lt;br /&gt;
Extending the OSSJClient with code download and verification feature would provide a important added value for&lt;br /&gt;
a reasonnable work overhead. It could therefore be done in priority.&lt;br /&gt;
&lt;br /&gt;
Please see other omments for further remarks.&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None (validated in previous review).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
    * Add a common About Box or help menu in the tool itself&lt;br /&gt;
          o (which lists name of tool, author, e-mail address of author, current version number and/or release date) &lt;br /&gt;
&lt;br /&gt;
Help is provided. Informations related to the authors are not.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Be reasonably easy to use&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; OK&lt;br /&gt;
&lt;br /&gt;
* Include online documention built into tool (based on required user documentation)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; should still be integrated.&lt;br /&gt;
	&lt;br /&gt;
* Include build scripts that facilitate building the application from source (Goal: One-click build)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; Completeness to be checked. Currently build tools are dependent of development environment (maven for Java; these environments &lt;br /&gt;
should be specified).&lt;br /&gt;
	&lt;br /&gt;
* Publicly accessible bug tracking system established, ideally at the same place as the source code repository (e.g., at Google code, or Sourceforge)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO, as far as I know&lt;br /&gt;
	&lt;br /&gt;
* Be run through Fortify Software's open source review (if appropriate) and FindBugs.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; TODO, or include reports	&lt;br /&gt;
	&lt;br /&gt;
* C/C++ apps (if we have any) should consider being run through Coverity's open source review. Coverity also accepts submissions for open source Java applications.&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO, or include reports&lt;br /&gt;
	&lt;br /&gt;
* When approved to be Release Quality: Update the link to it on: the OWASP Project page and update its project quality tag on its project page to be Release Quality. &lt;br /&gt;
&lt;br /&gt;
'''Recommendations''':&lt;br /&gt;
&lt;br /&gt;
* Conference style Powerpoint presentation that describes the use and status of the tool. (This could be used by others to discuss the tool at OWASP Chapter meetings, serve as easy to review offline documentation, etc.)&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; available&lt;br /&gt;
	&lt;br /&gt;
* UAT pass on functionality of the tool&lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO&lt;br /&gt;
	&lt;br /&gt;
* Developer documents any limitations &lt;br /&gt;
	&lt;br /&gt;
-&amp;gt; TODO&lt;br /&gt;
&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Documentation update could be done to adapt original design to current development status&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=53338</id>
		<title>Project Information:template OpenSign Server Project - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=53338"/>
				<updated>2009-02-08T14:25:32Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
* Client tool to generate RSA key pair and request signing certificate by return via a secure connection, secure connection will authenticate user after a dedicated registration process and also use mutual authentication SSL to avoid man-in-the-middle - returning certificate to user in real time. Registered developer can then submit their SPC online to verify the SPC.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; ok&lt;br /&gt;
&lt;br /&gt;
* Client tool to download software that will do a proper verification on the software against the code signing service&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; code download and verification is not available in the OSSJClient. Verification of the certificate is therefore performed&lt;br /&gt;
independently of the signed code (one step is missing in the process).&lt;br /&gt;
&lt;br /&gt;
* Website interface for the code signing service&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; ok&lt;br /&gt;
&lt;br /&gt;
* Set of Admin tools to manage the code signing service, user and certificate repository&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; available, but completeness of features should be validated&lt;br /&gt;
&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; The demonstration could be more explicit related to the integration of the tools in the software deployment process.&lt;br /&gt;
The role of entities (certificate, CSR) could be explained more precisely, so as to enable developpers with limited &lt;br /&gt;
security knowledge to use the tool. For instance: integrate the documentation (opendsign-concept.doc ...) in the&lt;br /&gt;
demo slides.&lt;br /&gt;
&lt;br /&gt;
Documentation in the code repository contains the original design doc rather than the current dev/use documentation.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''NOTE''': the deliverables are tagged in the project definition as 'idealized result', and were since the beginning identified&lt;br /&gt;
as an ambitious goal. The project delivers running tools and documentation, which do not fullfil these expectations,&lt;br /&gt;
but provide developpers with usefull and simple to use tools. The percentage are relative to the original definition.&lt;br /&gt;
&lt;br /&gt;
* Client tool to generate RSA key pair and request signing certificate by return via a secure connection, secure connection will authenticate user after a dedicated registration process and also use mutual authentication SSL to avoid man-in-the-middle - returning certificate to user in real time. Registered developer can then submit their SPC online to verify the SPC.&lt;br /&gt;
&lt;br /&gt;
100 %&lt;br /&gt;
&lt;br /&gt;
* Client tool to download software that will do a proper verification on the software against the code signing service&lt;br /&gt;
&lt;br /&gt;
50%&lt;br /&gt;
&lt;br /&gt;
* Website interface for the code signing service&lt;br /&gt;
90 %&lt;br /&gt;
&lt;br /&gt;
* Set of Admin tools to manage the code signing service, user and certificate repository&lt;br /&gt;
&lt;br /&gt;
70 %&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''First comments''':&lt;br /&gt;
&lt;br /&gt;
* it would be nice it it would be possible to simply download and run the code&lt;br /&gt;
for the server and the client (I have made some tests under linux, this seems not to be the case for the latter releases available on the project web page)&lt;br /&gt;
* available scripts for starting both under MS win &amp;amp; linux, with default config&lt;br /&gt;
* available user documentation: what can I do with each tool, how (for instance under the form of a '5 minutes introduction' and reference list of available functions) ?&lt;br /&gt;
* is the C# code available for download and execution ?&lt;br /&gt;
* it would be nice if the 'trunk' would be documented in a way that let the user know:&lt;br /&gt;
- how to compile everything (without needing to install libraries from the web) ?&lt;br /&gt;
&lt;br /&gt;
- how to run the server and clients (a global 'readme' file is missing).&lt;br /&gt;
&lt;br /&gt;
* Moreover, the 'opensign-design' document could be completed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=48807</id>
		<title>Project Information:template Application Security Verification Standard - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=48807"/>
				<updated>2008-12-14T16:25:07Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Application Security Verification Standard|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|OWASP Application Security Verification Standard Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''The opportunity, challenges, issues or need your proposal addresses'''&lt;br /&gt;
&lt;br /&gt;
OWASP is looking for a commercially-workable open standard for performing application security verification efforts. The problem is that there is a huge range in the coverage and level of rigor available in the market, and consumers have no way to tell the difference between someone just running a grep tool, and someone doing painstaking code review and manual testing. So, a standard is needed. &lt;br /&gt;
&lt;br /&gt;
''Comment: The draft proposes a standard of high quality which is adequate and suitable for use in commercial projects''.&lt;br /&gt;
&lt;br /&gt;
'''Objectives or ways in which you will meet the goal(s)'''&lt;br /&gt;
&lt;br /&gt;
The applicant’s proposal will address the above challenges as follows: &lt;br /&gt;
The applicant will define an evaluation framework that may be used to conduct OWASP Application Security Verification Standard certifications. &lt;br /&gt;
The applicant will define an OWASP Application Security Verification Standard which defines levels that applications may be certified against. &lt;br /&gt;
&lt;br /&gt;
''Comments: Those goals are met''.&lt;br /&gt;
&lt;br /&gt;
'''Long-term vision for the project'''&lt;br /&gt;
&lt;br /&gt;
The long-term vision for the project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing application security verification. &lt;br /&gt;
&lt;br /&gt;
''Comments: The ASVS Draft proposes a comprehensive document which can fully play this role and  be a support for making this vision a reality. The actual fullfillment of the vision will depend on the dissemination of the work and of its actual efficiency for web application projects''.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''The opportunity, challenges, issues or need your proposal addresses'''&lt;br /&gt;
&lt;br /&gt;
100%&lt;br /&gt;
&lt;br /&gt;
'''Objectives or ways in which you will meet the goal(s)'''&lt;br /&gt;
&lt;br /&gt;
100%&lt;br /&gt;
&lt;br /&gt;
'''Long-term vision for the project'''&lt;br /&gt;
&lt;br /&gt;
50% (Dissemination would be the remaining 50%, and do not pertain to the OWASP Summer of Code time frame).&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[https://www.owasp.org/images/7/78/Remarks_pparrend_2008_10_20.doc Comments on the ASVS Draft, 2008/10/20 ]]&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
None.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
* The Beta version of the OWASP Application Security Verification Standard 2008 – Web Application Edition, should comply with following quality criteria according to the OWASP Project Assessment guidelines:&lt;br /&gt;
&lt;br /&gt;
- All Alpha Quality Requirements&lt;br /&gt;
&lt;br /&gt;
''Have been asserted in the first review round.''&lt;br /&gt;
&lt;br /&gt;
- The document seems sufficiently or substantially complete with respect to the topic or process it is intended to cover. &lt;br /&gt;
&lt;br /&gt;
''It is. The remarks from my previous comments are solved.''&lt;br /&gt;
&lt;br /&gt;
- All wiki content has been reviewed by a technical editor to ensure that English grammar is correct, understandable, and the content flows well. &lt;br /&gt;
''OK. No particular comment, the online documentation is of quality.''&lt;br /&gt;
&lt;br /&gt;
- Clear efforts to interlink this document to other appropriate Beta and Release Quality OWASP Documentation and Tools projects have been made.&lt;br /&gt;
&lt;br /&gt;
'' OK (reference to the Owasp Top Ten, etc.)''&lt;br /&gt;
&lt;br /&gt;
* When approved to be Beta Quality: Update the link to it on: the OWASP Project page and update its project quality tag on its project page to be Beta. &lt;br /&gt;
&lt;br /&gt;
''OK.''&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
Following aspects are to be checked:&lt;br /&gt;
&lt;br /&gt;
- Compliance to the Owasp Writing Style&lt;br /&gt;
&lt;br /&gt;
- Availability at the OWASP Lulu Bookstore&lt;br /&gt;
&lt;br /&gt;
- Maybe experience reports with the ASVS would be a plus to validate it or decide to bring still further improvements to the ASVS Standard Beta Quality Draft before releasing it as a 'Release Quality' document.&lt;br /&gt;
&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=48806</id>
		<title>Project Information:template Application Security Verification Standard - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=48806"/>
				<updated>2008-12-14T16:20:31Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Application Security Verification Standard|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|OWASP Application Security Verification Standard Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''The opportunity, challenges, issues or need your proposal addresses'''&lt;br /&gt;
&lt;br /&gt;
OWASP is looking for a commercially-workable open standard for performing application security verification efforts. The problem is that there is a huge range in the coverage and level of rigor available in the market, and consumers have no way to tell the difference between someone just running a grep tool, and someone doing painstaking code review and manual testing. So, a standard is needed. &lt;br /&gt;
&lt;br /&gt;
''Comment: The draft proposes a standard of high quality which is adequate and suitable for use in commercial projects''.&lt;br /&gt;
&lt;br /&gt;
'''Objectives or ways in which you will meet the goal(s)'''&lt;br /&gt;
&lt;br /&gt;
The applicant’s proposal will address the above challenges as follows: &lt;br /&gt;
The applicant will define an evaluation framework that may be used to conduct OWASP Application Security Verification Standard certifications. &lt;br /&gt;
The applicant will define an OWASP Application Security Verification Standard which defines levels that applications may be certified against. &lt;br /&gt;
&lt;br /&gt;
''Comments: Those goals are met''.&lt;br /&gt;
&lt;br /&gt;
'''Long-term vision for the project'''&lt;br /&gt;
&lt;br /&gt;
The long-term vision for the project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing application security verification. &lt;br /&gt;
&lt;br /&gt;
''Comments: The ASVS Draft proposes a comprehensive document which can fully play this role and  be a support for making this vision a reality. The actual fullfillment of the vision will depend on the dissemination of the work and of its actual efficiency for web application projects''.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''The opportunity, challenges, issues or need your proposal addresses'''&lt;br /&gt;
&lt;br /&gt;
100%&lt;br /&gt;
&lt;br /&gt;
'''Objectives or ways in which you will meet the goal(s)'''&lt;br /&gt;
&lt;br /&gt;
100%&lt;br /&gt;
&lt;br /&gt;
'''Long-term vision for the project'''&lt;br /&gt;
&lt;br /&gt;
50% (Dissemination would be the remaining 50%, and do not pertain to the OWASP Summer of Code time frame).&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[https://www.owasp.org/images/7/78/Remarks_pparrend_2008_10_20.doc Comments on the ASVS Draft, 2008/10/20 ]]&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=44623</id>
		<title>Project Information:template OpenSign Server Project - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_Final_Review_-_First_Reviewer_-_D&amp;diff=44623"/>
				<updated>2008-10-26T11:59:54Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
'''First comments''':&lt;br /&gt;
&lt;br /&gt;
* it would be nice it it would be possible to simply download and run the code&lt;br /&gt;
for the server and the client (I have made some tests under linux, this seems not to be the case for the latter releases available on the project web page)&lt;br /&gt;
* available scripts for starting both under MS win &amp;amp; linux, with default config&lt;br /&gt;
* available user documentation: what can I do with each tool, how (for instance under the form of a '5 minutes introduction' and reference list of available functions) ?&lt;br /&gt;
* is the C# code available for download and execution ?&lt;br /&gt;
* it would be nice if the 'trunk' would be documented in a way that let the user know:&lt;br /&gt;
- how to compile everything (without needing to install libraries from the web) ?&lt;br /&gt;
&lt;br /&gt;
- how to run the server and clients (a global 'readme' file is missing).&lt;br /&gt;
&lt;br /&gt;
* Moreover, the 'opensign-design' document could be completed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44622</id>
		<title>Project Information:template Application Security Verification Standard - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44622"/>
				<updated>2008-10-26T11:23:04Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Application Security Verification Standard|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|OWASP Application Security Verification Standard Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[https://www.owasp.org/images/7/78/Remarks_pparrend_2008_10_20.doc Comments on the ASVS Draft, 2008/10/20 ]]&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Remarks_pparrend_2008_10_20.doc&amp;diff=44621</id>
		<title>File:Remarks pparrend 2008 10 20.doc</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Remarks_pparrend_2008_10_20.doc&amp;diff=44621"/>
				<updated>2008-10-26T11:20:27Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: Comments about the OWASP ASVS alpha release draft, on 2008_10_20.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Comments about the OWASP ASVS alpha release draft, on 2008_10_20.&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_First_Reviewer_-_C&amp;diff=37433</id>
		<title>Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_First_Reviewer_-_C&amp;diff=37433"/>
				<updated>2008-08-28T05:26:58Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
'''Alpha Quality for Tools'''&lt;br /&gt;
&lt;br /&gt;
*  Agree to OWASP's open source license&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;main&amp;quot; page for any OWASP tool must be on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* This page must:&lt;br /&gt;
o describe the tool, the project leader, contact info, and include all relevant links, including a download link for the code and the executable version,&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
o includes a roadmap/guideline pointing out the steps to achieve the purpose of project.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
o include the Alpha Quality Tool project tag. (Which we still need to define),&lt;br /&gt;
WHEN ACHIEVED&lt;br /&gt;
&lt;br /&gt;
o be placed at OWASP Project page.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Have its code and any documentation in Googlecode, or Sourceforge.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Mailing list for project created.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Solves a core application security need.&lt;br /&gt;
&lt;br /&gt;
OK since selected for the OWASP SoC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What has been done by the authors'''&lt;br /&gt;
&lt;br /&gt;
* documents:&lt;br /&gt;
&lt;br /&gt;
server concept and architecture : to be completed, Alpha quality OK&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* implementation:&lt;br /&gt;
&lt;br /&gt;
draft of the welcome page of the OpenSign Server Web Interface.&lt;br /&gt;
&lt;br /&gt;
code structure&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
* The criteria for alpha quality of the OpenSign Projects have been met before the 2008.07.15&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
Alpha Quality: 100 %.&lt;br /&gt;
&lt;br /&gt;
Overall project: 50 %&lt;br /&gt;
&lt;br /&gt;
Software development: 30 %&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Document sent to the authors, 1. week of July  [https://www.owasp.org/images/5/51/Review_opensign_pparrend_2008_07_04.doc]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_50_Review_Second_Review_E&amp;diff=37279</id>
		<title>Project Information:template Application Security Verification Standard 50 Review Second Review E</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Verification_Standard_50_Review_Second_Review_E&amp;diff=37279"/>
				<updated>2008-08-26T15:26:06Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Application Security Verification Standard|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|OWASP Application Security Verification Standard Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''Alpha quality for documents'''&lt;br /&gt;
&lt;br /&gt;
*  Agree to OWASP's open source license&lt;br /&gt;
OK: Attribution ShareAlike 2.5&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;main&amp;quot; page for any OWASP documentation project must be on the OWASP website. This page must:&lt;br /&gt;
&lt;br /&gt;
o describe the purpose and scope of project, the project leader, contact info, and include all relevant links,&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
o includes a roadmap/guideline pointing out the steps to achieve the purpose of project.&lt;br /&gt;
&lt;br /&gt;
Not on the page&lt;br /&gt;
&lt;br /&gt;
o includes a list of contributors, if a team effort.&lt;br /&gt;
&lt;br /&gt;
Does not apply&lt;br /&gt;
&lt;br /&gt;
o include the Alpha Quality Tool project tag. (Which we still need to define),&lt;br /&gt;
&lt;br /&gt;
o be placed at OWASP Project page.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Have all its content stored in the OWASP wiki.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Mailing list for project created.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Solves a core application security documentation/process need.&lt;br /&gt;
&lt;br /&gt;
Selected for the Owasp SOC 2008 for this reason.&lt;br /&gt;
&lt;br /&gt;
'''What has been done by the author'''&lt;br /&gt;
&lt;br /&gt;
First version of the ASVS document, with a complete summary, a complete presentation of the overall presentation process and a half of the document sections that are written.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Next objectives of the author:&lt;br /&gt;
&lt;br /&gt;
- Address comments on draft delivered 29th June as they are received.&lt;br /&gt;
&lt;br /&gt;
- Start and complete work on remaining documents/sections.&lt;br /&gt;
&lt;br /&gt;
- Address comments on remaining documents/sections as they are received.&lt;br /&gt;
&lt;br /&gt;
- Update OWASAP web site project page with status (on 15th September).&lt;br /&gt;
&lt;br /&gt;
- Update OWASAP web site project page with beta drafts (on 15th September).&lt;br /&gt;
&lt;br /&gt;
- Develop and discuss with OWASP a proposal to select a beta candidate application developer and to conduct a trial certification.&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP Application Security Verification Standard|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Alpha quality for Document:  100 % (up to an explicit roadmap, which does not seem necessary for a single document project with one single contributor)&lt;br /&gt;
&lt;br /&gt;
Final document: 50 %&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Document sent to the author in the 1. week of July: &lt;br /&gt;
[https://www.owasp.org/images/f/f0/Review_ASVS_pparrend_2008_07_05.doc]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Review_ASVS_pparrend_2008_07_05.doc&amp;diff=37277</id>
		<title>File:Review ASVS pparrend 2008 07 05.doc</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Review_ASVS_pparrend_2008_07_05.doc&amp;diff=37277"/>
				<updated>2008-08-26T15:17:20Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: Review document that has been transfered to the project author in the first week of July&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Review document that has been transfered to the project author in the first week of July&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_First_Reviewer_-_C&amp;diff=37276</id>
		<title>Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_First_Reviewer_-_C&amp;diff=37276"/>
				<updated>2008-08-26T15:16:13Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
'''Alpha Quality for Tools'''&lt;br /&gt;
&lt;br /&gt;
*  Agree to OWASP's open source license&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;main&amp;quot; page for any OWASP tool must be on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* This page must:&lt;br /&gt;
o describe the tool, the project leader, contact info, and include all relevant links, including a download link for the code and the executable version,&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
o includes a roadmap/guideline pointing out the steps to achieve the purpose of project.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
o include the Alpha Quality Tool project tag. (Which we still need to define),&lt;br /&gt;
WHEN ACHIEVED&lt;br /&gt;
&lt;br /&gt;
o be placed at OWASP Project page.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Have its code and any documentation in Googlecode, or Sourceforge.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Mailing list for project created.&lt;br /&gt;
&lt;br /&gt;
OK&lt;br /&gt;
&lt;br /&gt;
* Solves a core application security need.&lt;br /&gt;
&lt;br /&gt;
OK since selected for the OWASP SoC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What has been done by the authors'''&lt;br /&gt;
&lt;br /&gt;
* documents:&lt;br /&gt;
&lt;br /&gt;
server concept and architecture : to be completed, Alpha quality OK&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* implementation:&lt;br /&gt;
&lt;br /&gt;
draft of the welcome page of the OpenSign Server Web Interface.&lt;br /&gt;
&lt;br /&gt;
code structure&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
* The criteria for alpha quality of the OpenSign Projects have been met before the 2008.07.15&lt;br /&gt;
&lt;br /&gt;
* What has not been done:&lt;br /&gt;
&lt;br /&gt;
Implementation of the helper tools in Java. Only C++ versions are available. To let the project authors focus on the system architecture and basic functionalities, it has been decided that the availability of Java tools was not a priority requirement for the OpenSign project.&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
Alpha Quality: 100 %.&lt;br /&gt;
&lt;br /&gt;
Overall project: 50 %&lt;br /&gt;
&lt;br /&gt;
Software development: 30 %&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Document sent to the authors, 1. week of July  [https://www.owasp.org/images/5/51/Review_opensign_pparrend_2008_07_04.doc]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_First_Reviewer_-_C&amp;diff=37274</id>
		<title>Project Information:template OpenSign Server Project - 50 Review - First Reviewer - C</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_OpenSign_Server_Project_-_50_Review_-_First_Reviewer_-_C&amp;diff=37274"/>
				<updated>2008-08-26T15:00:32Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template OpenSign Server Project|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|OWASP OpenSign Server Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Online code signing and integrity verification service for open source community (OpenSign Server)|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Document sent to the authors, 1. week of July  [https://www.owasp.org/images/5/51/Review_opensign_pparrend_2008_07_04.doc]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Review_opensign_pparrend_2008_07_04.doc&amp;diff=37273</id>
		<title>File:Review opensign pparrend 2008 07 04.doc</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Review_opensign_pparrend_2008_07_04.doc&amp;diff=37273"/>
				<updated>2008-08-26T14:56:04Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: Review document that has been transfered to the project authors in the first week of July&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Review document that has been transfered to the project authors in the first week of July&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008&amp;diff=33448</id>
		<title>OWASP EU Summit 2008</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008&amp;diff=33448"/>
				<updated>2008-07-05T05:29:16Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Summer of Code 08 Participants &amp;amp; Reviewers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(WORK IN PROGRESS /UNDER DISCUSSION)&lt;br /&gt;
== UPDATES ==&lt;br /&gt;
*[[OWASP EU Summit 2008 - updates|'''OWASP EU Summit 2008 - updates''']]&lt;br /&gt;
&lt;br /&gt;
== What: OWASP Summit, a conference about OWASP and for OWASP's community ==&lt;br /&gt;
=== When: 4 to 7 Nov 2008 (4 &amp;amp; 5: Meetings and Training, 6 &amp;amp; 7: Conference) === &lt;br /&gt;
=== Where: Portugal ===&lt;br /&gt;
Faro or Lisbon&lt;br /&gt;
=== Organization===&lt;br /&gt;
Paulo Coimbra and Dinis Cruz&lt;br /&gt;
== Agenda ==&lt;br /&gt;
Theme: Present OWASP's projects, community and activities  .....     '....Connecting the dots.... &amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Day 1 &amp;amp; 2'''&lt;br /&gt;
*Training sessions (similar to what happens at the moment at the other OWASP conferences)&lt;br /&gt;
*OWASP Working Group sessions (1/2 day each) on:&lt;br /&gt;
** OWASP Governance, &amp;quot;What is OWASP's position on ....&amp;quot; &amp;amp; Action Plan for 2009&lt;br /&gt;
** ESAPI&lt;br /&gt;
** Browser Security&lt;br /&gt;
** OWASP Top 10 2009&lt;br /&gt;
&lt;br /&gt;
'''Day 3 &amp;amp; 4 Agenda:'''&lt;br /&gt;
* Presentations from AoC, SpoC and SoC Participants&lt;br /&gt;
* Presentations from 'Release' Quality OWASP projects (not included in the list above) or Key OWASP projects (like ESAPI)&lt;br /&gt;
* Presentations about OWASP : How it works, Financial reports, OotM (OWASP on the Move), new project management guidelines, local chapter finances, OWASP governance &lt;br /&gt;
* Presentation from Chapter leaders on the activities developed on their project&lt;br /&gt;
* Discussion on next steps for OWASP and focus of next OWASP financial investment plans&lt;br /&gt;
&lt;br /&gt;
Other ideas:&lt;br /&gt;
&lt;br /&gt;
* vote on 6th OWASP board member (Candidates to Apply)&lt;br /&gt;
&lt;br /&gt;
== other details==&lt;br /&gt;
&lt;br /&gt;
'''Projected Attendees:450 '''&lt;br /&gt;
* 200 with some (or all) expenses covered by OWASP&lt;br /&gt;
** 33 SoC participants&lt;br /&gt;
** 70 SoC reviewers&lt;br /&gt;
** 10 SoC Collaborators&lt;br /&gt;
** 15 AoC &amp;amp; SpoC participants&lt;br /&gt;
** 15 Chapter Leaders&lt;br /&gt;
** 8 OWASP Board &amp;amp; Employees&lt;br /&gt;
** 49 OWASP non-individual members (2x per 9k Corporate? 1x for the others?)&lt;br /&gt;
&lt;br /&gt;
=== Financial details ===&lt;br /&gt;
'''Expenses'''&lt;br /&gt;
* Accommodation &amp;amp; meals: 80,000 USD  = 400 USD per person (200x) for 3 nights accommodation  and 5 meals (3 dinners and 2 lunches)&lt;br /&gt;
* Flights &amp;amp;  Trains : 70,000 USD&lt;br /&gt;
&lt;br /&gt;
'''Revenue sources'''&lt;br /&gt;
* Tickets (for the 250 non 'OWASP invited' attendees)&lt;br /&gt;
* Training Sessions&lt;br /&gt;
* Conference sponsors&lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
=== OWASP Board members &amp;amp; employees ===&lt;br /&gt;
* Jeff Williams &lt;br /&gt;
* Dave Wichers &lt;br /&gt;
* Dinis Cruz &lt;br /&gt;
* Tom Brennan &lt;br /&gt;
* Sebastien Deleersnyder &lt;br /&gt;
* Paulo Coimbra&lt;br /&gt;
* Kate Hartmann (to be confirmed)&lt;br /&gt;
* Alison McNamee (to be confirmed)&lt;br /&gt;
* Larry Casey (to be confirmed)&lt;br /&gt;
&lt;br /&gt;
=== Summer of Code 08 Participants &amp;amp; Reviewers ===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* OWASP Classic ASP Security Project&lt;br /&gt;
**Reviewer Esteban Ribicic Argentina -living in Croatia/Wien-&lt;br /&gt;
**Project Lead - Juan Carlos Calderon - Mexico&lt;br /&gt;
* OWASP Internationalization Guidelines &lt;br /&gt;
**Reviewer Esteban Ribicic Argentina -living in Croatia/Wien-&lt;br /&gt;
**Project Lead - Juan Carlos Calderon - Mexico&lt;br /&gt;
* OWASP Spanish Project Reviewer Esteban Ribicic&lt;br /&gt;
**Reviewer Esteban Ribicic Argentina -living in Croatia/Wien-&lt;br /&gt;
**Project Lead - Juan Carlos Calderon - Mexico&lt;br /&gt;
* OWASP Ruby on Rails Security Project Leader Heiko Webers from Germany&lt;br /&gt;
* OWASP Code Review Guide Lead - Eoin Keary - Ireland&lt;br /&gt;
* OWASP Enigform and mod_Openpgp - Arturo Alberto Busleiman (a.k.a Buanzo) - Argentina&lt;br /&gt;
* OWASP AppSensor - Michael Coates - United States&lt;br /&gt;
* OWASP ASDR - Leonardo Cavallari Militelli - Brazil&lt;br /&gt;
*OWASP Corporate Application security guide- Parvathy Iyer- USA&lt;br /&gt;
* OWASP Backend Security Project - Carlo Pelliccioni - Italy&lt;br /&gt;
* OWASP Source Code Review OWASP Projects - Marco M. Morana (2nd reviewer) - United States&lt;br /&gt;
* OWASP Access Control Rules Tester Project&lt;br /&gt;
**Project leader - Andrew Petukhov - Russia, Moscow&lt;br /&gt;
* OWASP Live CD 2008&lt;br /&gt;
** Project Leader - Matt Tesauro - Austin, USA&lt;br /&gt;
* OWASP OpenSign Server Project&lt;br /&gt;
** Reviewer Pierre Parrend - France&lt;br /&gt;
&lt;br /&gt;
=== Spring of Code 07 Participants (Completed Projects) ===&lt;br /&gt;
* Refresh Attacks list - Przemyslaw Skowron - Poland&lt;br /&gt;
&lt;br /&gt;
* (please add your name)&lt;br /&gt;
* {Project} {Name} {Origin Country}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Autumn of Code 06 Participants ===&lt;br /&gt;
* (please add your name)&lt;br /&gt;
* {Project} {Name} {Origin Country}&lt;br /&gt;
&lt;br /&gt;
* WebScarab-NG, Rogan Dawes, South Africa&lt;br /&gt;
* OWASP Pantera, Simon Roses Femerling, Spain&lt;br /&gt;
&lt;br /&gt;
=== Active Chapter Leaders ===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* {Chapter} {Role} {Name} {Origin Country}&lt;br /&gt;
* Helsinki chapter leader - Antti Laulajainen, Finland&lt;br /&gt;
* NY/NJ Metro Board Member - Steve Antoniewicz, USA&lt;br /&gt;
* Twin-Cities chapter leader - Kuai Hinojosa, MN, USA&lt;br /&gt;
* Hawaii chapter leader/founder - Jim Manico, Anahola, Island of Kauai, Hawaii, USA&lt;br /&gt;
&lt;br /&gt;
=== Active Project Leaders (not currently participating on SoC 08)===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* {Project} {Role} {Name} {Origin Country}&lt;br /&gt;
.NET ESAPI - Project Leader - Alex Smolen - USA&lt;br /&gt;
&lt;br /&gt;
=== Significant Past OWASP contributor (that is not already covered by one of the above categories) ===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* {Project/Chapter} {Role} {Name} {Origin Country}&lt;br /&gt;
&lt;br /&gt;
=== Logistic and Support team ===&lt;br /&gt;
* Summit Graphic Design + Summit organization + on-site logistics support, Sarah Cruz, UK (London)&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20255</id>
		<title>Mobile Java Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20255"/>
				<updated>2007-07-27T09:51:11Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Owasp_security4mobileJava.pdf Dependability for Java Mobile Code] - Pierre Parrend.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
 &lt;br /&gt;
The recent increase of connected hand-held devices, through which the users access to the Internet and communicate with others, introduces a major programming model shift: applications are not only provided in a classical client-server fashion, but can also be loaded as mobile code on the end device. Consequently, new security threats arise: Malicious code can be hidden in the loaded code, and executed inside the device. A new approach to security is thus necessary: Dependability must be guaranteed, i.e. both usual security properties (Authentication, Integrity, Confidentiality) and robustness, so as to explicitly prevent DoS attacks.&lt;br /&gt;
&lt;br /&gt;
The state of the art of security for Java Mobile Code (MIDP and OSGi) is presented, as well as our research work on dependability in the context of the OSGi Platform.&lt;br /&gt;
&lt;br /&gt;
This presentation is the support for a talk that has been given for the [https://www.owasp.org/index.php/Switzerland OWASP Switzerland Local Chapter], the 24th of July, 2007.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20201</id>
		<title>Mobile Java Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20201"/>
				<updated>2007-07-26T16:16:03Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Owasp_security4mobileJava.pdf Dependability for Java Mobile Code] - Pierre Parrend (right-click and choose 'Save Link As' to download the presentation).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
 &lt;br /&gt;
The recent increase of connected handheld devices, through which the users access to the Internet and communicate with others, introduces a major programming model shift: applications are not only provided in a classical client-server fashion, but can also be loaded as mobile code on the end device. Consequently, new security threats arise: Malicious code can be hidden in the loaded code, and executed inside the device. A new approach to security is thus necessary: Dependability must be guaranteed, i.e. both usual security properties (Authentication, Integrity, Confidentiality) and robustness, so as to explicitly prevent DoS attacks.&lt;br /&gt;
&lt;br /&gt;
The state of the art of security for Java Mobile Code (MIDP and OSGi) is presented, as well as our research work on dependability in the context of the OSGi Platform.&lt;br /&gt;
&lt;br /&gt;
This presentation is the support for a talk that has been given for the [https://www.owasp.org/index.php/Switzerland OWASP Switzerland Local Chapter], the 24th of July, 2007.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20199</id>
		<title>Mobile Java Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20199"/>
				<updated>2007-07-26T14:50:33Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Owasp_security4mobileJava.pdf Dependability for Java Mobile Code] - Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
 &lt;br /&gt;
The recent increase of connected handheld devices, through which the users access to the Internet and communicate with others, introduces a major programming model shift: applications are not only provided in a classical client-server fashion, but can also be loaded as mobile code on the end device. Consequently, new security threats arise: Malicious code can be hidden in the loaded code, and executed inside the device. A new approach to security is thus necessary: Dependability must be guaranteed, i.e. both usual security properties (Authentication, Integrity, Confidentiality) and robustness, so as to explicitly prevent DoS attacks.&lt;br /&gt;
&lt;br /&gt;
The state of the art of security for Java Mobile Code (MIDP and OSGi) is presented, as well as our research work on dependability in the context of the OSGi Platform.&lt;br /&gt;
&lt;br /&gt;
This presentation is the support for a talk that has been given for the OWASP Group Swiss, the 24th of July, 2007.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20198</id>
		<title>Mobile Java Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Java_Security&amp;diff=20198"/>
				<updated>2007-07-26T14:49:06Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Owasp_security4mobileJava.pdf Dependability for Java Mobile Code] - Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
 &lt;br /&gt;
The recent increase of connected handheld devices, through which the users access to the Internet and communicate with others, introduces a major programming model shift: applications are not only provided in a classical client-server fashion, but can also be loaded as mobile code on the end device. Consequently, new security threats arise: Malicious code can be hidden in the loaded code, and executed inside the device. A new approach to security is thus necessary: Dependability must be guaranteed, i.e. both usual security properties (Authentication, Integrity, Confidentiality) and robustness, so as to explicitly prevent DoS attacks.&lt;br /&gt;
&lt;br /&gt;
The state of the art of security for Java Mobile Code (MIDP and OSGi) is presented, as well as our research work on dependability in the context of the OSGi Platform.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=19630</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=19630"/>
				<updated>2007-07-09T13:51:06Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Author==&lt;br /&gt;
Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language where the source code is quite intuitive to read. And in many cases, the compiled bytecode can also be reversed (or decompiled) into source code.  This presents problems for projects that require confidentiality of the source code.  This article provides an introduction to protecting bytecode through obfuscation.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
There are a number of freely available Java decompilers that all provide similar functionality, including:&lt;br /&gt;
&lt;br /&gt;
* Recover source code from Java bytecode,&lt;br /&gt;
* Retrieve names of local Variables and parameters,&lt;br /&gt;
* Retrieve comments and JavaDoc&lt;br /&gt;
&lt;br /&gt;
Popular decompilers include:&lt;br /&gt;
* [http://www.kpdus.com/jad.html JAD (JAva Decompiler)] - a little dated now and does not support Java 5.0&lt;br /&gt;
* [http://jode.sourceforge.net Jode] - Written entirely in Java and provides a Swing GUI&lt;br /&gt;
* [http://jrevpro.sourceforge.net/ jReversePro] - 100% Java, also slightly dated&lt;br /&gt;
&lt;br /&gt;
=== How to prevent Java code from being Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* Class file encryption. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
* Replacing the method names with certain characters e.g '/' or '.' in the class header causes the popular decompilation tools such as JAD to dump the source code which is incomprehensible (you cannot determine the control flow from the source).&lt;br /&gt;
&amp;lt;b&amp;gt;Note:&amp;lt;/b&amp;gt; Beware of 100% Java solutions using encryption to protect class files as these are more than likely snake oil.  Since the JVM has to read unencrypted class files at some point, even if the class files are encrypted on the disk, they will have to be decrypted before being passed to the JVM.  An attacker could modify the local JVM to simply write the class files to disk in their unencrypted form at this point.  (See: [http://www.javaworld.com/javaworld/javaqa/2003-05/01-qa-0509-jcrypt.html?page=2 Javaworld article]).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Conjecture:&amp;lt;/b&amp;gt; It's is very easy to circumvent these methods to reveal bytecode using a Java profiler.&lt;br /&gt;
&lt;br /&gt;
=== What obfuscation tools are available ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/fr.inria.ares.sfelixutils-0.1.jar fr.inria.ares.sfelixutils-0.1.jar package].&lt;br /&gt;
&lt;br /&gt;
Go to the main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file&lt;br /&gt;
(do not forget to adapt the libraryjars parameter to your own system) :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars fr.inria.ares.sfelixutils-0.1.jar&lt;br /&gt;
 -outjar fr.inria.ares.sfelixutils-0.1-obs.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/  Obfuscator list, by Google]&lt;br /&gt;
* [http://proguard.sourceforge.net/alternatives.html alternatives proposed by proguard]&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe]&lt;br /&gt;
* [http://www.cinnabarsystems.com/canner.html Canner]&lt;br /&gt;
* [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg]&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard]&lt;br /&gt;
* [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode]&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;br /&gt;
[[Category:Countermeasure]]&lt;br /&gt;
[[Category:How To]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=17077</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=17077"/>
				<updated>2007-03-07T21:33:20Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(0%, Seeking Volunteers)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation Overview ===&lt;br /&gt;
Input validation is perhaps the most important category of application security. Any data entering a software system must be verified to contain safe data that is not mounting a SQL Injection, XSS, CSRF or other form of attack. This is done primarily through the use of regular expressions. It's crucial not to hard-code input validation routines. Regular expressions should contained within a configuration file that can easily updated by an InfoSec professional and not require a programmers intervention or deployment of new application code. Application security needs change over time as new attack vectors are discovered. Application administers need to be able to react to these changes as quickly as possible. &lt;br /&gt;
&lt;br /&gt;
===Input Validation ===&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis (60%, Rohyt Belani, Review)&lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[Password length &amp;amp; complexity]] - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* [[Session Fixation in Java]] (100%, Rohyt Belani, Review)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Cryptographic_Extensions JCE] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Secure_Socket_Extensions JSSE] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Cryptographic_Extensions Random number generation] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* [[Protecting code archives with digital signatures]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* [[Signing jar files with jarsigner]] (100%, Pierre Parrend, Review)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jarsigner-test.zip&amp;diff=17061</id>
		<title>File:Jarsigner-test.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jarsigner-test.zip&amp;diff=17061"/>
				<updated>2007-03-07T21:03:32Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: Example files for the Tutorial 'Editing Signing jar files with jarsigner'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Example files for the Tutorial 'Editing Signing jar files with jarsigner'&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bindex-manifestMainAttrsModified-1.0.jar&amp;diff=16331</id>
		<title>File:Bindex-manifestMainAttrsModified-1.0.jar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bindex-manifestMainAttrsModified-1.0.jar&amp;diff=16331"/>
				<updated>2007-02-08T20:59:22Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fridgebundle-1.1.unknownsigner.jar&amp;diff=16330</id>
		<title>File:Fridgebundle-1.1.unknownsigner.jar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fridgebundle-1.1.unknownsigner.jar&amp;diff=16330"/>
				<updated>2007-02-08T20:58:57Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fridgebundle-1.1.jar&amp;diff=16329</id>
		<title>File:Fridgebundle-1.1.jar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fridgebundle-1.1.jar&amp;diff=16329"/>
				<updated>2007-02-08T20:58:32Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fridgebundle-1.1.signed.jar&amp;diff=16328</id>
		<title>File:Fridgebundle-1.1.signed.jar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fridgebundle-1.1.signed.jar&amp;diff=16328"/>
				<updated>2007-02-08T20:58:06Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=16327</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=16327"/>
				<updated>2007-02-08T17:51:40Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation Overview ===&lt;br /&gt;
Input validation is perhaps the most important category of application security. Any data entering a software system must be verified to contain safe data that is not mounting a SQL Injection, XSS, CSRF or other form of attack. This is done primarily through the use of regular expressions. It's crucial not to hard-code input validation routines. Regular expressions should contained within a configuration file that can easily updated by an InfoSec professional and not require a programmers intervention or deployment of new application code. Application security needs change over time as new attack vectors are discovered. Application administers need to be able to react to these changes as quickly as possible. &lt;br /&gt;
&lt;br /&gt;
===Input Validation ===&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[Password length &amp;amp; complexity]] - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Cryptographic_Extensions JCE] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Secure_Socket_Extensions JSSE] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Cryptographic_Extensions Random number generation] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* [[Protecting code archives with digital signatures]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* [[Signing jar files with jarsigner]] (20%, Pierre Parrend)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=16317</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=16317"/>
				<updated>2007-02-08T17:29:53Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation Overview ===&lt;br /&gt;
Input validation is perhaps the most important category of application security. Any data entering a software system must be verified to contain safe data that is not mounting a SQL Injection, XSS, CSRF or other form of attack. This is done primarily through the use of regular expressions. It's crucial not to hard-code input validation routines. Regular expressions should contained within a configuration file that can easily updated by an InfoSec professional and not require a programmers intervention or deployment of new application code. Application security needs change over time as new attack vectors are discovered. Application administers need to be able to react to these changes as quickly as possible. &lt;br /&gt;
&lt;br /&gt;
===Input Validation ===&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[Password length &amp;amp; complexity]] - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Cryptographic_Extensions JCE] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Secure_Socket_Extensions JSSE] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
* [http://www.owasp.org/index.php/Using_the_Java_Cryptographic_Extensions Random number generation] (80%, Joe Prasanna Kumar - To be reviewed)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* [[Protecting code archives with digital signatures]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* [[Signing jar files with jarsigner]] (0%, Pierre Parrend)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=13500</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=13500"/>
				<updated>2006-11-21T10:26:59Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation===&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* Password length &amp;amp; complexity - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* JCE (0%, TD)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* JSSE (0%, TD)&lt;br /&gt;
* Random number generation (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* [[Protecting code archives with digital signatures]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Signing jar files with jarsigner (0%, Pierre Parrend)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=13499</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=13499"/>
				<updated>2006-11-21T10:26:34Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation===&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* Password length &amp;amp; complexity - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* JCE (0%, TD)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* JSSE (0%, TD)&lt;br /&gt;
* Random number generation (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* [[Protecting code archives with digital signatures]] (100%, Pierre Parrend)&lt;br /&gt;
* Signing jar files with jarsigner (0%, Pierre Parrend)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Protecting_code_archives_with_digital_signatures&amp;diff=13498</id>
		<title>Talk:Protecting code archives with digital signatures</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Protecting_code_archives_with_digital_signatures&amp;diff=13498"/>
				<updated>2006-11-21T10:25:46Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Status==&lt;br /&gt;
Needs review&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
* Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
==General Discussion==&lt;br /&gt;
*  'An example with OSGi bundles' should be a subtitle, not a paragraph title.&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Validation-algorithm_lt.png&amp;diff=13488</id>
		<title>File:Validation-algorithm lt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Validation-algorithm_lt.png&amp;diff=13488"/>
				<updated>2006-11-21T10:16:07Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Signature-algorithm_lt.png&amp;diff=13487</id>
		<title>File:Signature-algorithm lt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Signature-algorithm_lt.png&amp;diff=13487"/>
				<updated>2006-11-21T10:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bundle-signed-example_lt.png&amp;diff=13486</id>
		<title>File:Bundle-signed-example lt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bundle-signed-example_lt.png&amp;diff=13486"/>
				<updated>2006-11-21T10:15:02Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Component-deployment-pbs_lt.png&amp;diff=13483</id>
		<title>File:Component-deployment-pbs lt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Component-deployment-pbs_lt.png&amp;diff=13483"/>
				<updated>2006-11-21T10:13:01Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=13472</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=13472"/>
				<updated>2006-11-21T09:58:01Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation===&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* Password length &amp;amp; complexity - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* JCE (0%, TD)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* JSSE (0%, TD)&lt;br /&gt;
* Random number generation (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, Review)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* [[Protecting code archives with digital signatures]] (0%, Pierre Parrend)&lt;br /&gt;
* Signing jar files with jarsigner (0%, Pierre Parrend)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Trustworthy_Java&amp;diff=13177</id>
		<title>Talk:Trustworthy Java</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Trustworthy_Java&amp;diff=13177"/>
				<updated>2006-11-17T09:07:22Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* General Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Status==&lt;br /&gt;
Under review&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
* Jeff Williams&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
* Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
==General Discussion==&lt;br /&gt;
&lt;br /&gt;
* The article is built around the claim 'you should use MS Trustworthy in Java'. However, it does not clearly defines what the exact principles of Trustworthy Computing are.&lt;br /&gt;
* This makes the author of the article sounds more a MS fan that providing real solution. Perhaps technical solutions to the identified problem could prevent this shortcut.&lt;br /&gt;
* Otherwise, the article is agreable to read and well written.&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Trustworthy_Java&amp;diff=13176</id>
		<title>Talk:Trustworthy Java</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Trustworthy_Java&amp;diff=13176"/>
				<updated>2006-11-17T09:06:18Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Status==&lt;br /&gt;
Under review&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
* Jeff Williams&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
* Pierre Parrend&lt;br /&gt;
&lt;br /&gt;
==General Discussion==&lt;br /&gt;
&lt;br /&gt;
* The article is built around the claim 'you should use MS Trustworthy in Java'. However, it does not clearly defines what the exact principles of Trustworthy Computing are.&lt;br /&gt;
* This makes the author of the article sounds more a MS fan that providing real solution. Perhaps technical solutions to the identified problem could prevent this shortcut.&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=12679</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=12679"/>
				<updated>2006-11-15T09:00:11Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation===&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* Password length &amp;amp; complexity - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* JCE (0%, TD)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* JSSE (0%, TD)&lt;br /&gt;
* Random number generation (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (100%, Pierre Parrend, TD)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* Signing jar files with jarsigner (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Bytecode_obfuscation&amp;diff=12678</id>
		<title>Talk:Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Bytecode_obfuscation&amp;diff=12678"/>
				<updated>2006-11-15T08:58:36Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Relative to the categories of this article:&lt;br /&gt;
&lt;br /&gt;
* the 'Countermeasure' category does not contain adequate sub-category. Should we add a 'Code Protection' one ?&lt;br /&gt;
* I put the article in the category 'Howto', because it is a pragmatic tutorial. However, it is not named 'Howto perform code obfuscation', and so looks strange in the list of howtos: https://www.owasp.org/index.php/Category:How_To.&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12677</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12677"/>
				<updated>2006-11-15T08:53:23Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/fr.inria.ares.sfelixutils-0.1.jar fr.inria.ares.sfelixutils-0.1.jar package].&lt;br /&gt;
&lt;br /&gt;
Go to the main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file&lt;br /&gt;
(do not forget to adapt the libraryjars parameter to your own system) :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars fr.inria.ares.sfelixutils-0.1.jar&lt;br /&gt;
 -outjar fr.inria.ares.sfelixutils-0.1-obs.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/  Obfuscator list, by Google]&lt;br /&gt;
* [http://proguard.sourceforge.net/alternatives.html alternatives proposed by proguard]&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe]&lt;br /&gt;
* [http://www.cinnabarsystems.com/canner.html Canner]&lt;br /&gt;
* [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg]&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard]&lt;br /&gt;
* [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode]&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;br /&gt;
[[Category:Countermeasure]]&lt;br /&gt;
[[Category:How To]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=12676</id>
		<title>OWASP Java Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Java_Table_of_Contents&amp;diff=12676"/>
				<updated>2006-11-15T08:46:23Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Protecting Binaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;b&amp;gt;Key:&amp;lt;/b&amp;gt;&lt;br /&gt;
* xx%: Progress status of the paragraph&lt;br /&gt;
* Review: The paragraph needs a review&lt;br /&gt;
* TD: Paragraph to be assigned&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Architects]]==&lt;br /&gt;
Discuss the security implications of common J2EE architectures.  This could be discussed in terms of: Authentication, Authorisation, Data Validation, Cross Site Scripting protection.  Other architecture concerns such as scalability, performance and maintainability can also be mentioned, but the focus on security should not be lost.&lt;br /&gt;
  &lt;br /&gt;
Any other security concerns that should be addressed during the design phase should also be mentioned here.&lt;br /&gt;
===Design considerations===&lt;br /&gt;
* Architectural considerations (0%, TD)&lt;br /&gt;
** EJB Middle tier (0%, TD)&lt;br /&gt;
** Web Services Middle tier (0%, TD)&lt;br /&gt;
** Spring Middle tier (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Developers]]==&lt;br /&gt;
=== Noteworthy Frameworks ===&lt;br /&gt;
Discuss important and relevant Java security frameworks that would be useful to architects.  The information should be at a suitably high level, for example, by discussing the advantages and features as well as the associated costs (direct and indirect) of using the frameworks.&lt;br /&gt;
&lt;br /&gt;
(50% ?, Claire McDonough, Ranjita Shankar Iyer, Rohyt Belani to update, Review)&lt;br /&gt;
*	Struts &lt;br /&gt;
*	Turbine&lt;br /&gt;
*	JFS (MyFaces)&lt;br /&gt;
*	Tapestry&lt;br /&gt;
*	Webwork&lt;br /&gt;
*	Cocoon&lt;br /&gt;
*	Tiles&lt;br /&gt;
*	SiteMesh&lt;br /&gt;
*	Spring&lt;br /&gt;
&lt;br /&gt;
===[[Java Security Basics]]===&lt;br /&gt;
Provide an introduction into the basic security services provided by the Java language and environment.  Remember to keep this relevant for web developers for the initial release - there may be a potential to expand this to thick clients in subsequent releases.&lt;br /&gt;
* Class Loading (0%, Shyaam Sundar, Review)&lt;br /&gt;
* Bytecode verifier (0%, Shyaam Sundar, Review)&lt;br /&gt;
* The Security Manager and security.policy file (0%, Shyaam Sundar, Review)&lt;br /&gt;
&lt;br /&gt;
===Input Validation===&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Dangerous calls (BufferedReader.readLine(), ServletRequest.getParameter(), etc...) (0%, TD)&lt;br /&gt;
* [[How to add validation logic to HttpServletRequest]] (100%, Jeff Williams, Review)&lt;br /&gt;
* [[How to perform HTML entity encoding in Java]] (100%, Jeff Williams, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing SQL Injection in Java]] ====&lt;br /&gt;
* Overview &lt;br /&gt;
* Prevention (60%, Stephen de Vries, Review)&lt;br /&gt;
** White Listing&lt;br /&gt;
** Prepared Statements&lt;br /&gt;
** Stored Procedures &lt;br /&gt;
** Hibernate &lt;br /&gt;
** Ibatis &lt;br /&gt;
** Spring JDBC &lt;br /&gt;
** EJB 3.0&lt;br /&gt;
** JDO&lt;br /&gt;
&lt;br /&gt;
==== [[Preventing LDAP Injection in Java]] ====&lt;br /&gt;
* Overview (100%, Stephen de Vries, Review)&lt;br /&gt;
* Prevention (100%, Stephen de Vries, Review)&lt;br /&gt;
&lt;br /&gt;
==== [[XPATH Injection]] ====&lt;br /&gt;
As with the other Injection sections, only provide cursory information on the general case. Should contain practical real-world advise and code examples for preventing XPATH injection.&lt;br /&gt;
* Overview (0%, TD)&lt;br /&gt;
* Prevention (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==== Miscellaneous Injection Attacks  ====&lt;br /&gt;
* HTTP Response splitting (0%, TD)&lt;br /&gt;
* Command injection - Runtime.getRuntime().exec() (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Authentication===&lt;br /&gt;
* Storing credentials - (0%, Adrian San Juan, Review)&lt;br /&gt;
* [[Hashing Java|Hashing]] - (100%, Michel Prunet, Review)&lt;br /&gt;
* [[SSL Best Practices]] - (20%, Philippe Curmin, Review)&lt;br /&gt;
* [[Using JCaptcha]] - (100%, Dave Ferguson, Review) &lt;br /&gt;
* Container-managed authentication with Realms&lt;br /&gt;
** [[Declarative Access Control in Java]] - (100%, Dave Ferguson, Reviewed by Pierre Parrend, Dave to act on comments)&lt;br /&gt;
* [[JAAS Timed Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* [[JAAS Tomcat Login Module]] - (100%, Stephen de Vries, Review)&lt;br /&gt;
* Password length &amp;amp; complexity - (0%, Adrian San Juan, Review)&lt;br /&gt;
&lt;br /&gt;
===Session Management ===&lt;br /&gt;
The generic problems and solutions for session management are covered in the Guide.  This section should focus on Java specific examples.&lt;br /&gt;
* Logout (0%, TD)&lt;br /&gt;
* Session Timeout (0%, TD)&lt;br /&gt;
* Absolute Timeout (0%, TD)&lt;br /&gt;
* Session Fixation (0%, TD)&lt;br /&gt;
* Terminating sessions (0%, TD)&lt;br /&gt;
** Terminating sessions when the browser window is closed&lt;br /&gt;
&lt;br /&gt;
===Authorization===&lt;br /&gt;
* Declarative v/s Programmatic (0%, TD)&lt;br /&gt;
* EJB Authorization (0%, TD)&lt;br /&gt;
* Acegi (0%, TD)&lt;br /&gt;
* JACC (0%, TD)&lt;br /&gt;
* Check horizontal privilege (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Encryption===&lt;br /&gt;
* JCE (0%, TD)&lt;br /&gt;
* Storing db secrets (0%, TD)&lt;br /&gt;
* Encrypting JDBC connections (0%, TD)&lt;br /&gt;
* JSSE (0%, TD)&lt;br /&gt;
* Random number generation (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Error Handling &amp;amp; Logging===&lt;br /&gt;
* Logging - why log? what to log? log4j, etc. (0%, TD)&lt;br /&gt;
* Exception handling techniques (0%, TD)&lt;br /&gt;
** fail-open/fail-closed&lt;br /&gt;
** resource cleanup&lt;br /&gt;
** finally block&lt;br /&gt;
** swallowing exceptions&lt;br /&gt;
* Exception handling frameworks (50%, TD)&lt;br /&gt;
** Servlet spec - web.xml [[Securing tomcat]] (100%, Darren Edmonds, Review)&lt;br /&gt;
** JSP errorPage (0%, TD)&lt;br /&gt;
* Web application forensics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Web Services Security ===&lt;br /&gt;
* SAML (0%, TD)&lt;br /&gt;
* (X)WS-Security (0%, TD)&lt;br /&gt;
* SunJWSDP (0%, TD)&lt;br /&gt;
* XML Signature (JSR 105) (0%, TD)&lt;br /&gt;
* XML Encryption (JSR 106) (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Code Analysis Tools ===&lt;br /&gt;
The introduction should cover the advantages and short comings of code analysis tools.  An overview of the current state of the art and the available tools would go well here.  As a start, only open source tools are listed, but if vendors of commercial tools adhere to the [[Tutorial]] guidelines, these submissions will be gladly received.&lt;br /&gt;
* Introduction (0%, TD)&lt;br /&gt;
* [[:Category:OWASP LAPSE Project]] (100%, Review)&lt;br /&gt;
* FindBugs (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* PMD (0%, TD)&lt;br /&gt;
** Creating custom rules&lt;br /&gt;
* JLint (0%, TD)&lt;br /&gt;
* Jmetrics (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[J2EE Security For Deployers]] ==&lt;br /&gt;
Practical step-by-step guides to securing various J2EE servers.  Examples of secure configurations can also be provided for download.  If configurations are provided, they should be properly commented so that the rationale for configuration settings is clearly explained.  Users of the configurations should be provided with enough information to make their own risk decisions.&lt;br /&gt;
=== Securing Popular J2EE Servers ===&lt;br /&gt;
* [[Securing tomcat|Securing Tomcat]] - (100%, Darren Edmonds, Review)&lt;br /&gt;
* Securing JBoss (0%, TD)&lt;br /&gt;
* Securing WebLogic (0%, TD)&lt;br /&gt;
* Securing WebSphere (0%, TD)&lt;br /&gt;
* Others...&lt;br /&gt;
&lt;br /&gt;
=== Defining a Java Security Policy ===&lt;br /&gt;
Practical information on creating a Java security policies for J2EE servers.&lt;br /&gt;
* PolicyTool (80%, Jeff Williams, Needs a new owner, Review)&lt;br /&gt;
* jChains (www.jchains.org) - (0%, TD)&lt;br /&gt;
&lt;br /&gt;
=== Protecting Binaries ===&lt;br /&gt;
* Bytecode manipulation tools and techniques (0%, TD)&lt;br /&gt;
* [[Bytecode obfuscation]] (90%, Pierre Parrend, TD)&lt;br /&gt;
* Convert bytecode to native machine code (0%, TD)&lt;br /&gt;
* Signing jar files with jarsigner (0%, TD)&lt;br /&gt;
&lt;br /&gt;
==[[J2EE Security for Security Analysts and Testers]]==&lt;br /&gt;
* Using Eclipse to verify Java applications (0%, TD)&lt;br /&gt;
* Using [[:Category:OWASP WebScarab Project|WebScarab]] to find vulnerabilities in J2EE applications - (0%, TD)&lt;br /&gt;
* Decompiling Java bytecode (0%, TD)&lt;br /&gt;
&lt;br /&gt;
== [[Java Security Resources]] (ongoing)==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Java Project]]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12675</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12675"/>
				<updated>2006-11-15T08:44:59Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/fr.inria.ares.sfelixutils-0.1.jar fr.inria.ares.sfelixutils-0.1.jar package].&lt;br /&gt;
&lt;br /&gt;
Go to the main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file&lt;br /&gt;
(do not forget to adapt the libraryjars parameter to your own system) :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars fr.inria.ares.sfelixutils-0.1.jar&lt;br /&gt;
 -outjar fr.inria.ares.sfelixutils-0.1-obs.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/  Obfuscator list, by Google]&lt;br /&gt;
* [http://proguard.sourceforge.net/alternatives.html alternatives proposed by proguard]&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe]&lt;br /&gt;
* [http://www.cinnabarsystems.com/canner.html Canner]&lt;br /&gt;
* [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg]&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard]&lt;br /&gt;
* [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode]&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard]&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12674</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12674"/>
				<updated>2006-11-15T08:40:39Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Using Proguard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/fr.inria.ares.sfelixutils-0.1.jar fr.inria.ares.sfelixutils-0.1.jar package].&lt;br /&gt;
&lt;br /&gt;
Go to the main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file&lt;br /&gt;
(do not forget to adapt the libraryjars parameter to your own system) :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars fr.inria.ares.sfelixutils-0.1.jar&lt;br /&gt;
 -outjar fr.inria.ares.sfelixutils-0.1-obs.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12673</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12673"/>
				<updated>2006-11-15T08:34:40Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Using Proguard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/fr.inria.ares.sfelixutils-0.1.jar fr.inria.ares.sfelixutils-0.1.jar package].&lt;br /&gt;
&lt;br /&gt;
Go tothe main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file&lt;br /&gt;
(do not forget to adapt the libraryjars parameter to your own system) :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars fr.inria.ares.sfelixutils-0.1.jar&lt;br /&gt;
 -outjar fr.inria.ares.sfelixutils-0.1-obs.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12672</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12672"/>
				<updated>2006-11-15T08:22:11Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Using Proguard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/genericFrame.jar genericFrame.jar package], part of [http://www.rzo.free.fr/development.php a simple demo application ].&lt;br /&gt;
&lt;br /&gt;
Go tothe main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file&lt;br /&gt;
(do not forget to adapt the libraryjars parameter to your own system) :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars genericFrame.jar&lt;br /&gt;
 -outjar genericFrameOut.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12671</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12671"/>
				<updated>2006-11-15T08:14:23Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* How to prevent your Java code to be Reverse-engineered ? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of Line Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/genericFrame.jar genericFrame.jar package], part of [http://www.rzo.free.fr/development.php a simple demo application ].&lt;br /&gt;
&lt;br /&gt;
Go tothe main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars genericFrame.jar&lt;br /&gt;
 -outjar genericFrameOut.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12670</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12670"/>
				<updated>2006-11-15T08:11:13Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* How to prevent your Java code to be Reverse-engineered ? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of File Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems, or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the first is proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/genericFrame.jar genericFrame.jar package], part of [http://www.rzo.free.fr/development.php a simple demo application ].&lt;br /&gt;
&lt;br /&gt;
Go tothe main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars genericFrame.jar&lt;br /&gt;
 -outjar genericFrameOut.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12669</id>
		<title>Bytecode obfuscation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bytecode_obfuscation&amp;diff=12669"/>
				<updated>2006-11-15T08:10:15Z</updated>
		
		<summary type="html">&lt;p&gt;Pparrend: /* Using Proguard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Java is a language which code is quite intuitive to read. But some also complain that compiled code is as easy to read as source code - or at least it is easy to recover. You will find here a couple of hints and tips about this matter of fact, and how to deal with it if you need to prevent people to exploit code they should not work with.&lt;br /&gt;
&lt;br /&gt;
=== How to recover Source Code from Bytecode? ===&lt;br /&gt;
&lt;br /&gt;
The main program for uncompiling code is [http://www.kpdus.com/jad.html JAD (JAva Decompiler)]. It provides following advantages :&lt;br /&gt;
&lt;br /&gt;
* Recover code from Java ByteCode,&lt;br /&gt;
* Get clean code for your own programs,&lt;br /&gt;
* Remove Comments, Javadoc, Names of local Variables, Names of Parameters,&lt;br /&gt;
* Several Graphical interfaces, available on the web site.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent your Java code to be Reverse-engineered ? ===&lt;br /&gt;
&lt;br /&gt;
Several actions can be taken for preventing reverse-engineering :&lt;br /&gt;
&lt;br /&gt;
* Code Obfuscation. This is done mainly through variable renaming; see next paragraph for more precisions,&lt;br /&gt;
* Suppression of End Of File Characters. This makes the code difficult to parse,&lt;br /&gt;
* Use of anonymous classes for handling events. This seems not to be handled by many Decompiler; however, JAD copes pretty well with this.&lt;br /&gt;
* File encoding. This implies some overhead for uncyphering at runtime. Several tools are available:: [http://www.cinnabarsystems.com/canner.html Canner], by Cinnabar Systems,  [http://www.mycgiserver.com/~ipnetdevelop/katirya.html Katirya], or  [http://www.jbitsoftware.com/JBit/do/displayPage?targetPageId=products.jlockinfo JLock by JSoft]. They are available for evaluation, and the two first are proposed currently for Windows Platforms only.&lt;br /&gt;
&lt;br /&gt;
=== What tools do exists for Obfuscation ? ===&lt;br /&gt;
&lt;br /&gt;
A lot of tools exist for Java code Obfuscation. You can find extensive lists under following URLs, or simply type 'obfuscator' in your favorite search engine :&lt;br /&gt;
&lt;br /&gt;
* http://directory.google.com/Top/Computers/Programming/Languages/Java/Development_Tools/Obfuscators/&lt;br /&gt;
* http://proguard.sourceforge.net/alternatives.html&lt;br /&gt;
&lt;br /&gt;
Among those projects, some are open source project, and therefore more suitable for research - but also for enterprises who wish to control the programs they use (without any warranty):&lt;br /&gt;
&lt;br /&gt;
* [http://proguard.sourceforge.net/ Proguard] is a shrinker (make code more compact), and optimizer and obfuscator.&lt;br /&gt;
* [http://jode.sourceforge.net/ Jode] is a decompiler, an optimizer and an obfuscator. It contains facilities for cleaning logging statements,,&lt;br /&gt;
* [http://jarg.sourceforge.net/ Jarg],&lt;br /&gt;
* [http://sourceforge.net/projects/javaguard/ Javaguard], which is a simple obfuscator, without many documentation,&lt;br /&gt;
* [http://www.geocities.com/CapeCanaveral/Hall/2334/Programs/cafebabe.html CafeBabe], which allows precise view of Bytecode files and single file obfuscation; a good tool for teaching ByteCode Structure, more than a production tool.&lt;br /&gt;
&lt;br /&gt;
== Using Proguard ==&lt;br /&gt;
&lt;br /&gt;
The following section provides a short tutorial for using [http://proguard.sourceforge.net/ Proguard].&lt;br /&gt;
&lt;br /&gt;
First, download the code under [http://sourceforge.net/project/showfiles.php?group_id=54750 following url ] and unzip it.&lt;br /&gt;
&lt;br /&gt;
For this tutorial, we use the [http://www.rzo.free.fr/applis/genericFrame.jar genericFrame.jar package], part of [http://www.rzo.free.fr/development.php a simple demo application ].&lt;br /&gt;
&lt;br /&gt;
Go tothe main directory of Proguard. For lauching it, you can use following script with given parameters :&lt;br /&gt;
&lt;br /&gt;
       java -jar lib/proguard.jar @config-genericFrame.pro&lt;br /&gt;
&lt;br /&gt;
config-genericFrame.pro is the option file :&lt;br /&gt;
&lt;br /&gt;
 -obfuscationdictionary ./examples/dictionaries/compact.txt&lt;br /&gt;
 -libraryjars /usr/java/j2sdk1.4.2_10/jre/lib/rt.jar&lt;br /&gt;
 -injars genericFrame.jar&lt;br /&gt;
 -outjar genericFrameOut.jar&lt;br /&gt;
 -dontshrink&lt;br /&gt;
 -dontoptimize&lt;br /&gt;
 -keep public class proguard.ProGuard {&lt;br /&gt;
 public static void main(java.lang.String[]);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
Remark that the 'keep' option is mandatory, we use this default class for not keep anything out.&lt;br /&gt;
&lt;br /&gt;
The example dictionnary (here compact.txt) is given with the code.&lt;br /&gt;
&lt;br /&gt;
The output is stored in the package 'genericFrameOut.jar'.&lt;br /&gt;
&lt;br /&gt;
You can observe the modifications implied by obfuscation with following commands :&lt;br /&gt;
&lt;br /&gt;
 jar xvf genericFrameOut.jar&lt;br /&gt;
 cd genericFrame/pub/gui/&lt;br /&gt;
 jad c.class&lt;br /&gt;
 more c.jad more c.jad&lt;br /&gt;
&lt;br /&gt;
Remark than Strings are kept unmodified. If you want you code to be hard to read, do not forget to remove any debugging and logging comments. Jode has some facilities for making this easier.&lt;br /&gt;
&lt;br /&gt;
== Using CafeBabe ==&lt;br /&gt;
&lt;br /&gt;
CafeBabe is a convenient tool for teaching structure of ByteCode files. You can [http://www.geocities.com/CapeCanaveral/Hall/2334/programs.html download it at this URL].&lt;br /&gt;
&lt;br /&gt;
 Unzip it and execute following command :&lt;br /&gt;
 java -classpath CafeBabe.jar org.javalobby.apps.cafebabe.CafeBabe&lt;br /&gt;
&lt;br /&gt;
Have a look at some class from the original genericFrame.jar package.&lt;br /&gt;
&lt;br /&gt;
Then obfuscate it, and compare both - original and modified class :&lt;br /&gt;
&lt;br /&gt;
* with the CafeBabe viewer,&lt;br /&gt;
* after decompiling it with JAD.&lt;br /&gt;
&lt;br /&gt;
What conclusion can you draw of it ?&lt;br /&gt;
&lt;br /&gt;
== Using Jode ==&lt;br /&gt;
&lt;br /&gt;
Jode is to be found [http://jode.sourceforge.net/ here].&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Pparrend</name></author>	</entry>

	</feed>