This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP WebSpa Project"

From OWASP
Jump to: navigation, search
m (Quick Download)
(Updated project roadmap for WebSpa v0.8 - v0.9)
Line 293: Line 293:
 
= Roadmap =
 
= Roadmap =
  
== Release 0.9 (Q3/2014) ==  
+
== Release 0.9 (Q3/2015) ==  
  
WebSpa_v0.9 will examine attacks on the web knocking tool and propose controls in order to address the issues in question.  
+
WebSpa_v0.9 will be major release and include a comprehensive redesign of the WebKnock format in order to improve overall security and robustness of the request. The tickets for this release are:
  
== Release 0.8 (Q2/2014) ==
+
44 New WebKnock request format should be defined
 +
42 Do not limit the web knock to 100 characters, instead use SHA-512 lengths
 +
35 A threat model for WebSpa should be created and reviewed
 +
33 Apache should be replaced by nginx
  
WebSpa_v0.8 will incorporate in the server side component (run with -server option) the ability for a WebSpa administrator to generate a single output of all actions available for a user of WebSpa. The 12 tickets for this release are:
+
== Release 0.85 (Q1/2015) ==
 +
WebSpa_v0.85 will offer improved usability features, which will simplify installing, configuring and running WebSpa. The tickets for this release are:
  
  42 Do not limit the web knock to 100 characters, instead use SHA-512 lengths  
+
  40 Log to /​var/​log instead of a log.txt file
 +
15 Add easy way to run the server as a background daemon  
 +
 
 +
== Release 0.8 (Q4/2014) ==
 +
 
 +
WebSpa_v0.8 will be sort of a proof-of-concept of WebSpa. A stable version to demonstrate the concept of WebKnocking, however, with some limitations with regards to usability/configuration and modularity (e.g. changing the hashing algorithm). The tickets for this release are:
 +
 
 +
  43 Change SSL configuration to allow wget
 
  41 WebSpa administrator to WebSpa user output  
 
  41 WebSpa administrator to WebSpa user output  
40 Log to /​var/​log instead of a log.txt file
 
 
  38 umask 077 should be added to webspa.sh  
 
  38 umask 077 should be added to webspa.sh  
35 A threat model for WebSpa should be created and reviewed
 
33 Apache should be replaced by nginx
 
 
  32 A known_hosts file should be used to maintain the list of successfully verified keys  
 
  32 A known_hosts file should be used to maintain the list of successfully verified keys  
 
  31 Verification of server's public key fingerprint should be possible  
 
  31 Verification of server's public key fingerprint should be possible  
 
  30 Help Files Update (0.8)  
 
  30 Help Files Update (0.8)  
 
  27 Arrays.equals is not a constant time function  
 
  27 Arrays.equals is not a constant time function  
15 Add easy way to run the server as a background daemon
 
 
  2 Create maven build task for release  
 
  2 Create maven build task for release  
  

Revision as of 18:53, 26 August 2014

OWASP WebSpa Project

The OWASP WebSpa Project is a Java web knocking tool for sending a single HTTP/S request to your web server in order to authorize the execution of a premeditated Operating System (O/S) command. It provides a cryptographically protected "open sesame" mechanism on the web application layer, comparable to well-known port-knocking techniques.

Description

This project implements the concept of web knocking by offering a jar file that 'tails' the access log of an existing web server. A user submits a specially crafted URL, therefore executing a predefined O/S command. No new ports or services are created.

Similarly to traditional network port-knocking schemes, the OWASP WebSpa Project aims to create a covert channel of communication for O/S commands over the web application layer. This channel is by no means bi-directional: It is only the client that can issue commands to the server. The inverse, i.e. the server issuing commands to the client, is not an option within the current version.

Licensing

The OWASP WebSpa Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

The source code that comes with the OWASP WebSpa Project in the form of the tool named Web-Spa is released as open source software under the terms of the GNU Public License (GPL) version 3. For reference, the full text of the GPL_v3 can be downloaded from the Free Software Foundation. There are no plans to change the license; web-spa will always remain an open source project free for use by anyone subject to the terms of the license.


What is WebSpa?

OWASP WebSpa provides:

  • A secure channel for executing premeditated O/S commands on your web server
  • A resource-efficient single jar-file that can either be run as server, or client application, depending on the command line parameters


Presentation

http://sourceforge.net/projects/webspa/



Quick Download

WebSpa v0.7

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files CODE.jpg