tournament 1.1.0 → 2.0.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (264) hide show
  1. data/History.txt +15 -0
  2. data/Manifest.txt +241 -2
  3. data/README.txt +152 -12
  4. data/Rakefile +9 -6
  5. data/bin/benchmark_pool +0 -0
  6. data/bin/gui.rb +3 -1
  7. data/bin/picker +0 -0
  8. data/bin/pool +139 -15
  9. data/lib/tournament/bracket.rb +33 -50
  10. data/lib/tournament/entry.rb +3 -0
  11. data/lib/tournament/pool.rb +144 -93
  12. data/lib/tournament/scoring_strategy.rb +69 -0
  13. data/lib/tournament/webgui_installer.rb +109 -0
  14. data/tasks/ann.rake +19 -14
  15. data/tasks/bones.rake +6 -25
  16. data/tasks/gem.rake +46 -36
  17. data/tasks/git.rake +41 -0
  18. data/tasks/jamis.rb +589 -0
  19. data/tasks/notes.rake +28 -0
  20. data/tasks/post_load.rake +18 -11
  21. data/tasks/{doc.rake → rdoc.rake} +12 -9
  22. data/tasks/rubyforge.rake +12 -12
  23. data/tasks/setup.rb +121 -80
  24. data/tasks/spec.rake +12 -13
  25. data/tasks/svn.rake +15 -11
  26. data/tasks/test.rake +6 -6
  27. data/test/test_tournament.rb +8 -0
  28. data/test/test_webgui_installer.rb +64 -0
  29. data/webgui/README +256 -0
  30. data/webgui/Rakefile +10 -0
  31. data/webgui/app/controllers/admin_controller.rb +61 -0
  32. data/webgui/app/controllers/application.rb +25 -0
  33. data/webgui/app/controllers/entry_controller.rb +97 -0
  34. data/webgui/app/controllers/pool_controller.rb +4 -0
  35. data/webgui/app/controllers/reports_controller.rb +7 -0
  36. data/webgui/app/controllers/sessions_controller.rb +43 -0
  37. data/webgui/app/controllers/teams_controller.rb +75 -0
  38. data/webgui/app/controllers/users_controller.rb +57 -0
  39. data/webgui/app/helpers/admin_helper.rb +2 -0
  40. data/webgui/app/helpers/application_helper.rb +3 -0
  41. data/webgui/app/helpers/entry_helper.rb +2 -0
  42. data/webgui/app/helpers/pool_helper.rb +2 -0
  43. data/webgui/app/helpers/reports_helper.rb +2 -0
  44. data/webgui/app/helpers/sessions_helper.rb +2 -0
  45. data/webgui/app/helpers/teams_helper.rb +2 -0
  46. data/webgui/app/helpers/users_helper.rb +93 -0
  47. data/webgui/app/models/entry.rb +42 -0
  48. data/webgui/app/models/pool.rb +141 -0
  49. data/webgui/app/models/region.rb +3 -0
  50. data/webgui/app/models/role.rb +4 -0
  51. data/webgui/app/models/seeding.rb +4 -0
  52. data/webgui/app/models/team.rb +6 -0
  53. data/webgui/app/models/user.rb +98 -0
  54. data/webgui/app/models/user_mailer.rb +25 -0
  55. data/webgui/app/views/admin/bracket.html.erb +3 -0
  56. data/webgui/app/views/admin/entries.html.erb +25 -0
  57. data/webgui/app/views/admin/index.html.erb +17 -0
  58. data/webgui/app/views/admin/pool.html.erb +53 -0
  59. data/webgui/app/views/entry/index.html.erb +16 -0
  60. data/webgui/app/views/entry/print.erb +1 -0
  61. data/webgui/app/views/entry/print.html.erb +1 -0
  62. data/webgui/app/views/entry/show.html.erb +1 -0
  63. data/webgui/app/views/layouts/bracket.html.erb +37 -0
  64. data/webgui/app/views/layouts/default.html.erb +62 -0
  65. data/webgui/app/views/layouts/print.html.erb +12 -0
  66. data/webgui/app/views/layouts/report.html.erb +38 -0
  67. data/webgui/app/views/pool/index.html.erb +36 -0
  68. data/webgui/app/views/reports/_report.html.erb +11 -0
  69. data/webgui/app/views/reports/show.html.erb +12 -0
  70. data/webgui/app/views/sessions/new.html.erb +21 -0
  71. data/webgui/app/views/shared/_admins.html.erb +8 -0
  72. data/webgui/app/views/shared/_bracket.html.erb +1296 -0
  73. data/webgui/app/views/teams/choose.html.erb +57 -0
  74. data/webgui/app/views/user_mailer/activation.erb +3 -0
  75. data/webgui/app/views/user_mailer/signup_notification.erb +8 -0
  76. data/webgui/app/views/users/_user_bar.html.erb +8 -0
  77. data/webgui/app/views/users/new.html.erb +19 -0
  78. data/webgui/config/boot.rb +109 -0
  79. data/webgui/config/database.yml +22 -0
  80. data/webgui/config/environment.rb +78 -0
  81. data/webgui/config/environments/development.rb +29 -0
  82. data/webgui/config/environments/production.rb +24 -0
  83. data/webgui/config/environments/test.rb +22 -0
  84. data/webgui/config/initializers/inflections.rb +10 -0
  85. data/webgui/config/initializers/mime_types.rb +5 -0
  86. data/webgui/config/initializers/new_rails_defaults.rb +17 -0
  87. data/webgui/config/initializers/pool.rb +33 -0
  88. data/webgui/config/initializers/site_keys.rb +38 -0
  89. data/webgui/config/locales/en.yml +5 -0
  90. data/webgui/config/routes.rb +56 -0
  91. data/webgui/db/development.sqlite3 +0 -0
  92. data/webgui/db/migrate/20090216015836_create_entries.rb +13 -0
  93. data/webgui/db/migrate/20090217001611_add_tie_break_to_entry.rb +9 -0
  94. data/webgui/db/migrate/20090217004039_create_users.rb +23 -0
  95. data/webgui/db/migrate/20090217014940_relate_entry_and_user.rb +10 -0
  96. data/webgui/db/migrate/20090218024350_create_roles.rb +17 -0
  97. data/webgui/db/migrate/20090218024657_add_postition_to_roles.rb +9 -0
  98. data/webgui/db/migrate/20090218025240_add_admin_role.rb +10 -0
  99. data/webgui/db/migrate/20090225022928_create_pools.rb +16 -0
  100. data/webgui/db/migrate/20090225030346_associate_pool_and_entry.rb +9 -0
  101. data/webgui/db/migrate/20090225072358_change_pool_data_column.rb +9 -0
  102. data/webgui/db/migrate/20090225072849_add_completed_to_entries.rb +9 -0
  103. data/webgui/db/migrate/20090225074149_add_pool_id_index_to_entries.rb +9 -0
  104. data/webgui/db/migrate/20090225084414_add_user_id_to_pool.rb +9 -0
  105. data/webgui/db/migrate/20090226021913_add_active_to_pools.rb +9 -0
  106. data/webgui/db/migrate/20090226142240_rename_bracket_column_to_data.rb +9 -0
  107. data/webgui/db/migrate/20090301014710_create_teams.rb +84 -0
  108. data/webgui/db/migrate/20090301025902_add_more_teams.rb +16 -0
  109. data/webgui/db/migrate/20090301041526_create_seedings.rb +16 -0
  110. data/webgui/db/migrate/20090301090511_create_regions.rb +14 -0
  111. data/webgui/db/migrate/teams.txt +347 -0
  112. data/webgui/db/pool.yml +408 -0
  113. data/webgui/db/schema.rb +91 -0
  114. data/webgui/db/test.sqlite3 +0 -0
  115. data/webgui/doc/README_FOR_APP +5 -0
  116. data/webgui/lib/authenticated_system.rb +189 -0
  117. data/webgui/lib/authenticated_test_helper.rb +11 -0
  118. data/webgui/lib/form_object.rb +70 -0
  119. data/webgui/lib/pdf_helper.rb +47 -0
  120. data/webgui/lib/prince.rb +74 -0
  121. data/webgui/lib/saves_picks.rb +23 -0
  122. data/webgui/lib/tasks/admin.rake +10 -0
  123. data/webgui/public/404.html +30 -0
  124. data/webgui/public/422.html +30 -0
  125. data/webgui/public/500.html +33 -0
  126. data/webgui/public/dispatch.cgi +10 -0
  127. data/webgui/public/dispatch.fcgi +24 -0
  128. data/webgui/public/dispatch.rb +10 -0
  129. data/webgui/public/favicon.ico +0 -0
  130. data/webgui/public/images/2009FinalFour.png +0 -0
  131. data/webgui/public/images/rails.png +0 -0
  132. data/webgui/public/javascripts/application.js +2 -0
  133. data/webgui/public/javascripts/bracket.js +73 -0
  134. data/webgui/public/javascripts/controls.js +963 -0
  135. data/webgui/public/javascripts/dragdrop.js +973 -0
  136. data/webgui/public/javascripts/effects.js +1128 -0
  137. data/webgui/public/javascripts/prototype.js +4320 -0
  138. data/webgui/public/robots.txt +5 -0
  139. data/webgui/public/stylesheets/bracket-print.css +39 -0
  140. data/webgui/public/stylesheets/bracket.css +125 -0
  141. data/webgui/public/stylesheets/main.css +144 -0
  142. data/webgui/public/stylesheets/prince.css +6 -0
  143. data/webgui/public/stylesheets/prince_landscape.css +1 -0
  144. data/webgui/script/about +4 -0
  145. data/webgui/script/console +3 -0
  146. data/webgui/script/dbconsole +3 -0
  147. data/webgui/script/destroy +3 -0
  148. data/webgui/script/generate +3 -0
  149. data/webgui/script/performance/benchmarker +3 -0
  150. data/webgui/script/performance/profiler +3 -0
  151. data/webgui/script/performance/request +3 -0
  152. data/webgui/script/plugin +3 -0
  153. data/webgui/script/process/inspector +3 -0
  154. data/webgui/script/process/reaper +3 -0
  155. data/webgui/script/process/spawner +3 -0
  156. data/webgui/script/runner +3 -0
  157. data/webgui/script/server +3 -0
  158. data/webgui/test/fixtures/entries.yml +10 -0
  159. data/webgui/test/fixtures/pools.yml +14 -0
  160. data/webgui/test/fixtures/regions.yml +11 -0
  161. data/webgui/test/fixtures/roles.yml +11 -0
  162. data/webgui/test/fixtures/roles_users.yml +3 -0
  163. data/webgui/test/fixtures/seedings.yml +12 -0
  164. data/webgui/test/fixtures/teams.yml +3051 -0
  165. data/webgui/test/fixtures/users.yml +44 -0
  166. data/webgui/test/functional/admin_controller_test.rb +8 -0
  167. data/webgui/test/functional/entry_controller_test.rb +27 -0
  168. data/webgui/test/functional/pool_controller_test.rb +8 -0
  169. data/webgui/test/functional/reports_controller_test.rb +8 -0
  170. data/webgui/test/functional/sessions_controller_test.rb +82 -0
  171. data/webgui/test/functional/teams_controller_test.rb +216 -0
  172. data/webgui/test/functional/users_controller_test.rb +88 -0
  173. data/webgui/test/performance/browsing_test.rb +9 -0
  174. data/webgui/test/test_helper.rb +38 -0
  175. data/webgui/test/unit/entry_test.rb +8 -0
  176. data/webgui/test/unit/pool_test.rb +8 -0
  177. data/webgui/test/unit/region_test.rb +8 -0
  178. data/webgui/test/unit/role_test.rb +8 -0
  179. data/webgui/test/unit/seeding_test.rb +8 -0
  180. data/webgui/test/unit/team_test.rb +10 -0
  181. data/webgui/test/unit/user_mailer_test.rb +31 -0
  182. data/webgui/test/unit/user_test.rb +109 -0
  183. data/webgui/vendor/plugins/auto_complete/README +23 -0
  184. data/webgui/vendor/plugins/auto_complete/Rakefile +22 -0
  185. data/webgui/vendor/plugins/auto_complete/init.rb +2 -0
  186. data/webgui/vendor/plugins/auto_complete/lib/auto_complete.rb +47 -0
  187. data/webgui/vendor/plugins/auto_complete/lib/auto_complete_macros_helper.rb +143 -0
  188. data/webgui/vendor/plugins/auto_complete/test/auto_complete_test.rb +67 -0
  189. data/webgui/vendor/plugins/enumerations_mixin/ATTENTION +15 -0
  190. data/webgui/vendor/plugins/enumerations_mixin/LICENSE +20 -0
  191. data/webgui/vendor/plugins/enumerations_mixin/README_ENUMERATIONS +163 -0
  192. data/webgui/vendor/plugins/enumerations_mixin/init.rb +21 -0
  193. data/webgui/vendor/plugins/enumerations_mixin/lib/active_record/acts/enumerated.rb +177 -0
  194. data/webgui/vendor/plugins/enumerations_mixin/lib/active_record/aggregations/has_enumerated.rb +60 -0
  195. data/webgui/vendor/plugins/enumerations_mixin/lib/active_record/virtual_enumerations.rb +68 -0
  196. data/webgui/vendor/plugins/enumerations_mixin/virtual_enumerations_sample.rb +76 -0
  197. data/webgui/vendor/plugins/restful_authentication/.gitignore +21 -0
  198. data/webgui/vendor/plugins/restful_authentication/CHANGELOG +68 -0
  199. data/webgui/vendor/plugins/restful_authentication/README.textile +224 -0
  200. data/webgui/vendor/plugins/restful_authentication/Rakefile +32 -0
  201. data/webgui/vendor/plugins/restful_authentication/TODO +15 -0
  202. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/USAGE +1 -0
  203. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/authenticated_generator.rb +478 -0
  204. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/lib/insert_routes.rb +54 -0
  205. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/_model_partial.html.erb +8 -0
  206. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/activation.erb +3 -0
  207. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/authenticated_system.rb +189 -0
  208. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/authenticated_test_helper.rb +22 -0
  209. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/controller.rb +43 -0
  210. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/helper.rb +2 -0
  211. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/login.html.erb +16 -0
  212. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/mailer.rb +25 -0
  213. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/migration.rb +26 -0
  214. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/model.rb +83 -0
  215. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/model_controller.rb +85 -0
  216. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/model_helper.rb +93 -0
  217. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/model_helper_spec.rb +158 -0
  218. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/observer.rb +11 -0
  219. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/signup.html.erb +19 -0
  220. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/signup_notification.erb +8 -0
  221. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/site_keys.rb +38 -0
  222. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/controllers/access_control_spec.rb +90 -0
  223. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/controllers/authenticated_system_spec.rb +102 -0
  224. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/controllers/sessions_controller_spec.rb +139 -0
  225. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/controllers/users_controller_spec.rb +198 -0
  226. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/fixtures/users.yml +60 -0
  227. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/helpers/users_helper_spec.rb +141 -0
  228. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/spec/models/user_spec.rb +290 -0
  229. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/rest_auth_stories.rb +22 -0
  230. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/rest_auth_stories_helper.rb +81 -0
  231. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/steps/ra_navigation_steps.rb +49 -0
  232. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/steps/ra_resource_steps.rb +179 -0
  233. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/steps/ra_response_steps.rb +171 -0
  234. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/steps/user_steps.rb +153 -0
  235. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/users/accounts.story +186 -0
  236. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/stories/users/sessions.story +134 -0
  237. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/test/functional_test.rb +82 -0
  238. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/test/mailer_test.rb +31 -0
  239. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/test/model_functional_test.rb +93 -0
  240. data/webgui/vendor/plugins/restful_authentication/generators/authenticated/templates/test/unit_test.rb +164 -0
  241. data/webgui/vendor/plugins/restful_authentication/init.rb +1 -0
  242. data/webgui/vendor/plugins/restful_authentication/install.rb +1 -0
  243. data/webgui/vendor/plugins/restful_authentication/lib/authentication/by_cookie_token.rb +82 -0
  244. data/webgui/vendor/plugins/restful_authentication/lib/authentication/by_password.rb +64 -0
  245. data/webgui/vendor/plugins/restful_authentication/lib/authentication.rb +40 -0
  246. data/webgui/vendor/plugins/restful_authentication/lib/authorization/aasm_roles.rb +63 -0
  247. data/webgui/vendor/plugins/restful_authentication/lib/authorization/stateful_roles.rb +62 -0
  248. data/webgui/vendor/plugins/restful_authentication/lib/authorization.rb +14 -0
  249. data/webgui/vendor/plugins/restful_authentication/lib/trustification/email_validation.rb +20 -0
  250. data/webgui/vendor/plugins/restful_authentication/lib/trustification.rb +14 -0
  251. data/webgui/vendor/plugins/restful_authentication/notes/AccessControl.txt +2 -0
  252. data/webgui/vendor/plugins/restful_authentication/notes/Authentication.txt +5 -0
  253. data/webgui/vendor/plugins/restful_authentication/notes/Authorization.txt +154 -0
  254. data/webgui/vendor/plugins/restful_authentication/notes/RailsPlugins.txt +78 -0
  255. data/webgui/vendor/plugins/restful_authentication/notes/SecurityFramework.graffle +0 -0
  256. data/webgui/vendor/plugins/restful_authentication/notes/SecurityFramework.png +0 -0
  257. data/webgui/vendor/plugins/restful_authentication/notes/SecurityPatterns.txt +163 -0
  258. data/webgui/vendor/plugins/restful_authentication/notes/Tradeoffs.txt +126 -0
  259. data/webgui/vendor/plugins/restful_authentication/notes/Trustification.txt +49 -0
  260. data/webgui/vendor/plugins/restful_authentication/rails/init.rb +3 -0
  261. data/webgui/vendor/plugins/restful_authentication/restful-authentication.gemspec +33 -0
  262. data/webgui/vendor/plugins/restful_authentication/tasks/auth.rake +33 -0
  263. metadata +288 -8
  264. data/tasks/annotations.rake +0 -22
@@ -0,0 +1,14 @@
1
+ module Authorization
2
+ def self.included(recipient)
3
+ recipient.extend(ModelClassMethods)
4
+ recipient.class_eval do
5
+ include ModelInstanceMethods
6
+ end
7
+ end
8
+
9
+ module ModelClassMethods
10
+ end # class methods
11
+
12
+ module ModelInstanceMethods
13
+ end # instance methods
14
+ end
@@ -0,0 +1,20 @@
1
+ module Trustification
2
+ module EmailValidation
3
+ unless Object.constants.include? "CONSTANTS_DEFINED"
4
+ CONSTANTS_DEFINED = true # sorry for the C idiom
5
+ end
6
+
7
+ def self.included(recipient)
8
+ recipient.extend(ClassMethods)
9
+ recipient.class_eval do
10
+ include InstanceMethods
11
+ end
12
+ end
13
+
14
+ module ClassMethods
15
+ end # class methods
16
+
17
+ module InstanceMethods
18
+ end # instance methods
19
+ end
20
+ end
@@ -0,0 +1,14 @@
1
+ module Trustification
2
+ def self.included(recipient)
3
+ recipient.extend(ModelClassMethods)
4
+ recipient.class_eval do
5
+ include ModelInstanceMethods
6
+ end
7
+ end
8
+
9
+ module ModelClassMethods
10
+ end # class methods
11
+
12
+ module ModelInstanceMethods
13
+ end # instance methods
14
+ end
@@ -0,0 +1,2 @@
1
+
2
+ See the notes in [[Authorization]]
@@ -0,0 +1,5 @@
1
+ Guides to best practices:
2
+ * "The OWASP Guide to Building Secure Web Applications":http://www.owasp.org/index.php/Category:OWASP_Guide_Project
3
+ ** specifically, of course, the chapter on Authentication.
4
+ * "Secure Programming for Linux and Unix HOWTO":http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/web-authentication.html
5
+ * "Authentication and Identification,":http://www.downes.ca/post/12 by Stephen Downes **Highly Recommended**
@@ -0,0 +1,154 @@
1
+ h2. Authorization
2
+
3
+ "Best Practices for Authorization":http://www.owasp.org/index.php/Guide_to_Authorization
4
+ # auth system should deny by default
5
+ # Principle of least privilege (fine-grain)
6
+ # each non-anonymous entry point have an access control check
7
+ # authorization check at or near the beginning of code implementing sensitive activities
8
+ # Ensure that Model code checks to ensure that the requesting user should have access to the protected resource.
9
+ # Reauthorization for high value activities or after idle out
10
+ # If custom code is required to perform authorization functions, consider
11
+ fail-safe authentication and exception handling – ensure that if an exception
12
+ is thrown, the user is logged out or at least prevented from accessing the
13
+ protected resource or function.
14
+ # Well written applications centralize access control routines, so if any bugs
15
+ are found, they can be fixed once and the results apply throughout the
16
+ application immediately.
17
+
18
+ h2. Authorization in a trust context
19
+
20
+ * [http://en.wikipedia.org/wiki/Authorization]
21
+ * remember: goal is **prediction** not **control**
22
+
23
+ h2. Patterns for Policy definition / Authorization / access control
24
+
25
+ *Reference Monitor (SecPatt p256)
26
+ ** Set of authorization rules
27
+ ** Actor, Action, Resource => Monitor+(rules) => ctrlr
28
+ * Role based:
29
+ subj, role, right. action, resource
30
+ RBAC, access is controlled at the system level, outside of the user's control
31
+ * Filter based
32
+ User x Controller x Action x Params --
33
+ * Object based
34
+ model security delegation
35
+ * Access Control Matrix http://en.wikipedia.org/wiki/Access_Control_Matrix
36
+ * CommandProcessor pattern (DSL approach)
37
+ * DENY FROM ... / ALLOW FROM ... approach
38
+ * Capability based control: bundle together the designation of an object and the permission to access that object
39
+ ie. I can name it if and only if I am allowed to get at it.
40
+
41
+ h2. Notes from "Security patterns":http://www.amazon.com/Security-Patterns-Integrating-Engineering-Software/dp/0470858842
42
+ by M Schumacher ("website for book":http://www.securitypatterns.org/)
43
+
44
+ Reference Monitor (SecPatt p256)
45
+ * Set of authorization rules
46
+ * Actor, Action, Resource => Monitor+(rules) => ctrlr
47
+
48
+ = Full access with Errors (SecPatt p305)
49
+
50
+ * Users should not be able to view data or perform operations for which they
51
+ have no permissions.
52
+ * Hiding an available and accessible function is inappropriate, because users
53
+ must be able to see what they can do.
54
+ * The visual appeal and usability of a graphical user interface (GUI) can be de-
55
+ graded by varying layouts depending on the (current) access rights of a
56
+ user. For example, blank space might appear for some users where others see
57
+ options they can access, or sequence and number of menu items might differ,
58
+ depending on the current user’s rights, and thus ‘blind’ operation of the menu
59
+ by an expe- rienced user is no longer possible.
60
+ * Showing currently unavailable functions can tease users to into upgrading
61
+ their access rights, for example by paying for the access or buying a license
62
+ after us- ing a demo version.
63
+ * Trial and error are ineffective means of learning which functions are
64
+ accessible. Invoking an operation only to learn that it doesn’t work with
65
+ your access rights is confusing.
66
+ * The privilege grouping of the typical user community might not be known at the
67
+ design time of the GUI, and it might change over time, for example through
68
+ organizational or business process changes, so that providing a few special
69
+ modes of the GUI depending on the corresponding user roles is inappropriate.
70
+ * Checking whether a function is allowed by a user is most efficient, robust and
71
+ secure, if done by the function itself—at least the code performing the checks
72
+ is then closely related to the code performing the subsequent operation
73
+ afterwards.
74
+
75
+ h2. Outcomes / Obligations
76
+
77
+ -- forbid
78
+ -- ask for trust escalation (eg log in, prove_as_human, validate_email, are_you_sure, send_me_ten_cents)
79
+ -- drag ass
80
+ -- permit
81
+
82
+ -- reinterpret past actions based on future evolution of trust
83
+ -- prioritize changesets based on trust.
84
+
85
+
86
+ h2. Notes from "Core Security Patterns":http://www.coresecuritypatterns.com/patterns.htm website
87
+
88
+ # Authentication Enforcer who the hell are you
89
+ # Intercepting Validator Is your request well-formed
90
+ # Authorization Enforcer Are you allowed to do that
91
+ # Secure Logger Know what's happening/happened
92
+ #
93
+
94
+ h2. notes from "XACML":http://www.nsitonline.in/hemant/stuff/xacml/XACML%20Tutorial%20with%20a%20Use%20Case%20Scenario%20for%20Academic%20Institutions.htm
95
+
96
+ PolicySets [Policy Combining Algorithm]
97
+ Policy [Rule Combining Algorithm] (defines access to particular resources.)
98
+ # Target
99
+ ## Subject Attributes
100
+ ## Resource Attributes
101
+ ## Action Attributes
102
+ ## Environment Attributes
103
+ # Rule [Effect] Identify various conditions or cases under which a policy may become applicable
104
+ ## Subject Attributes user who has made an access request
105
+ ## Resource Attributes object to which access is requested
106
+ ## Action Attributes action the subject wants to take on the resource
107
+ ## Environment Attributes request environment (time of day, ip, etc)
108
+ ## Conditions
109
+ # Obligations
110
+
111
+ Roles -- student, janitor, dean, stranger, ...
112
+ Branches -- Departments, etc.
113
+
114
+ * Examine applicable rules until you get an outcome, failure or passes thru (in which case rejected)
115
+ * Rule combining Algorithms
116
+
117
+ * Obligations -- things to do once requests have been denied or permitted
118
+
119
+ Reference Monitor (SecPatt p256)
120
+ * Set of authorization rules
121
+ * Actor, Action, Resource --> Monitor+(rules) --> ctrlr
122
+
123
+ #
124
+ # ask for permissions on arbitrary (subject, action, resource)
125
+ * roles
126
+ # get filtered object based on action (:public_info, :admin_info, etc.)
127
+ # attach a rule to a (subject|role, action, resource) triple
128
+ "subject should have role R"
129
+ "subject should have role R on resource X"
130
+ "should meet the
131
+
132
+ * Role supervisor:
133
+ * adds, defines, removes roles. no policy -- just attaches roles to users
134
+
135
+ * Policy
136
+ answers "can Actor do Action to Resource"
137
+ * Rules
138
+ * Rule resolution
139
+ * outcome, obligations.
140
+ policy definitions can come from many places, go to policy mgr.
141
+ * Hall monitor
142
+ enforces policy (before filters)
143
+ * Policy observers
144
+ handle policy obligations
145
+
146
+ * Athentication -- identification, really: securely attach visitor to identity
147
+ * Validation -- qualify trust
148
+ * Access control -- define policy
149
+ ** Roles
150
+ ** Acc. matrix
151
+ * Authorization -- enforce policy (reference monitor ; filter chain)
152
+ * Obligations
153
+ ** Audit -- (observer)
154
+
@@ -0,0 +1,78 @@
1
+ h1. Rails Authentication, Authorization and Access Control plugins
2
+
3
+ h2. Authentication plugins
4
+
5
+ * http://github.com/technoweenie/restful-authentication/tree/master -- the accepted standard for authentication
6
+ * http://github.com/mrflip/restful-authentication/tree/master -- my fork of restful_authentication with more modularity, more specs and a few security tweaks
7
+ * http://github.com/josh/open_id_authentication/tree/master -- OpenID authentication
8
+
9
+ h2. Authorization plugins
10
+
11
+ From
12
+ * http://agilewebdevelopment.com/plugins/tag/security
13
+ * http://www.vaporbase.com/postings/Authorization_in_Rails
14
+
15
+ * http://github.com/jbarket/restful-authorization/tree/master
16
+
17
+ * http://agilewebdevelopment.com/plugins/rolerequirement
18
+ http://code.google.com/p/rolerequirement/
19
+ http://rolerequirement.googlecode.com/svn/tags/role_requirement/
20
+ 9 votes
21
+
22
+ * http://github.com/ezmobius/acl_system2/
23
+ http://agilewebdevelopment.com/plugins/acl_system
24
+ http://opensvn.csie.org/ezra/rails/plugins/dev/acl_system2/
25
+ last touched 2006
26
+ 57 votes on AWD
27
+ * also: http://agilewebdevelopment.com/plugins/acl_system2_ownership
28
+
29
+ bq. access_control [:new, :create, :update, :edit] => '(admin | user |
30
+ moderator)', :delete => 'admin'
31
+ <% restrict_to "(admin | moderator) & !blacklist" do %>
32
+ <%= link_to "Admin & Moderator only link", :action =>'foo' %>
33
+ <% end %>
34
+
35
+ * Authorization Recipe (from Rails Recipes #32)
36
+ http://www.vaporbase.com/postings/Authorization_in_Rails
37
+ http://opensvn.csie.org/mabs29/plugins/simple_access_control
38
+
39
+ * Active ACL
40
+ http://phpgacl.sourceforge.net/demo/phpgacl/docs/manual.html
41
+ (Access-matrix driven)
42
+
43
+ * http://github.com/aiwilliams/access_controlled_system
44
+
45
+ * http://agilewebdevelopment.com/plugins/access
46
+
47
+ * http://robzon.aenima.pl/2007/12/base-auth-is-out.html
48
+ http://agilewebdevelopment.com/plugins/base_auth
49
+ http://base-auth.googlecode.com/svn/trunk/
50
+ 40 votes
51
+
52
+ * http://agilewebdevelopment.com/plugins/authorization
53
+ http://www.writertopia.com/developers/authorization
54
+ http://github.com/DocSavage/rails-authorization-plugin/tree/master
55
+ Opaque policy descriptions
56
+ 19 votes
57
+
58
+ * http://github.com/shuber/access_control_list/
59
+ Not much there yet
60
+
61
+ * https://opensvn.csie.org/traccgi/tobionrails
62
+ http://agilewebdevelopment.com/plugins/access_control
63
+ http://opensvn.csie.org/tobionrails/plugins/access_control
64
+ last touched 1 year ago
65
+
66
+ * http://github.com/mdarby/restful_acl/
67
+ -- google code too --
68
+ Just does REST? More of an app than a plugin.
69
+
70
+ * http://github.com/stonean/lockdown/tree/master
71
+ http://lockdown.rubyforge.org
72
+ http://groups.google.com/group/stonean_lockdown?hl=en
73
+ "Lockdown stores an array of access rights in the session"
74
+
75
+ h2. Trust / Validation etc. plugins
76
+
77
+
78
+ * http://agilewebdevelopment.com/plugins/recaptcha
@@ -0,0 +1,163 @@
1
+ h1. Security from the perspective of a community site.
2
+
3
+ Better than anything you'll read below on the subject:
4
+
5
+ * "The OWASP Guide to Building Secure Web Applications":http://www.owasp.org/index.php/Category:OWASP_Guide_Project
6
+ * "Secure Programming for Linux and Unix HOWTO":http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/web-authentication.html
7
+ * "Core Security Patterns":http://www.coresecuritypatterns.com/patterns.htm
8
+ * Stephen Downes' article on "Authentication and Identification":http://www.downes.ca/post/12
9
+
10
+ h2. Snazzy Diagram
11
+
12
+ !http://github.com/technoweenie/restful-authentication/tree/master/notes/SecurityFramework.png?raw=true!:http://github.com/technoweenie/restful-authentication/tree/master/notes/SecurityFramework.png
13
+
14
+ (in notes/SecurityFramework.png)
15
+
16
+ h2. Terms
17
+
18
+ * Identification: Assign this visitor a name and an associated identity
19
+ (picture, website, favorite pokemon, trust metric, security roles).
20
+
21
+ bq. "Behold. I am not Gandalf the Grey, whom you betrayed, I am Gandalf the White,
22
+ who has returned from death." -- Tolkien
23
+
24
+ * Authentication: Verify this visitor matches the claimed identity.
25
+
26
+ bq. "My name is Werner Brandis. My voice is my password. Verify me." -- Sneakers
27
+
28
+ * Authorization: Given a request (Actions+Resource+Environment), decide if it's safe.
29
+
30
+ bq. "Of every tree of the garden thou mayest freely eat: But of the tree of
31
+ the knowledge of good and evil, thou shalt not eat of it: for in the day that
32
+ thou eatest thereof thou shalt surely die." -- Gen 2:16-17
33
+
34
+ * Trust: Confidence this visitor will act reliably.
35
+
36
+ bq. "A copper! A copper! How d'ya like that, boys? And we went for it. _I_ went
37
+ for it. Treated him like a kid brother. And I was gonna split fifty-fifty with
38
+ a copper." -- James Cagney, White Heat
39
+
40
+ ** Reputation from Trust Network: Award trust to this visitor based on what other trusted parties say.
41
+
42
+ bq. "He used my name? In the /street/? He called me a punk? My name was on
43
+ the street? When we bounce from this s-t here, Y'all gonna go down on them
44
+ corners, let the people know: word did not get back to me. Let 'em know Marlo
45
+ step to any m-f-: Omar, Barksdale, whoever. My name IS my NAME." -- Marlo
46
+ Stansfield, The Wire (paraphrased)
47
+
48
+ * Reputation from Past Actions:
49
+
50
+ bq. "The man you just killed was just released from prison. He could've f-in'
51
+ walked. All he had to do was say my dad's name, but he didn't; he kept his
52
+ f-ing mouth shut. And did his f-in' time, and he did it like a man. He did
53
+ four years for us. So, Mr. Orange, you're tellin' me this very good friend of
54
+ mine, who did four years for my father, who in four years never made a deal,
55
+ no matter what they dangled in front of him, you're telling me that now, that
56
+ now this man is free, and we're making good on our commitment to him, he's
57
+ just gonna decide, out of the f-ing blue, to rip us off?" -- Nice Guy Eddie,
58
+ Reservoir Dogs
59
+
60
+ * Access control
61
+
62
+ ** Role
63
+ * http://en.wikipedia.org/wiki/Role-based_access_control
64
+ * "Role-Based Access Control FAQ":http://csrc.nist.gov/groups/SNS/rbac/faq.html
65
+ * "Role Based Access Control and Role Based Security":http://csrc.nist.gov/groups/SNS/rbac/ from the NIST Computer Security Division
66
+
67
+
68
+ * Auditing & Recovery
69
+
70
+ h2. Concept
71
+
72
+ @ The below is a mixture of half-baked, foolish and incomplete. Just sos you know. @
73
+
74
+ * Identity here will mean 'online presence' -- user account, basically.
75
+ * Person will mean the remote endpoint -- whether that's a person or robot or
76
+ company. (Security papers call this "Subject" but that's awful).
77
+ * It's easy to confuse 'person' and 'identity', so easy I probably have below.
78
+
79
+ Why do you need to authenticate? For authorization. So traditionally, we think
80
+
81
+ person <- (ath'n token) <- identity <- (policy) <- actions
82
+
83
+ That is, actions are attached to an identity by security policy, identity is
84
+ attached to a person by their authentication token.
85
+
86
+ The problem is that we cannot authenticate a /person/, only the token they
87
+ present: password, ATM card+PIN number, etc.
88
+ bq. "The Doors of Durin, Lord of Moria. Speak friend, and enter" -- Tolkien
89
+
90
+ Anyone who presents that card+PIN, Elvish catchphrase, or voice print will be
91
+ authenticated to act as the corresponding identity (account holder, friend of
92
+ the elves, nerdy scientist), and we have no control over those tokens.
93
+
94
+ person <- (ath'n token) <- identity <- (az'n policy) <- actions
95
+ ^^^^ This step is wrong.
96
+
97
+ The solution is to not care, or rather to reframe our goals.
98
+
99
+ What we actually want is not to /control/ users' actions, but to /predict/ them.
100
+ When Mr. Blonde helps Mr. White rob a jewelry store it's a security failure for
101
+ the store but a success for the crime gang. When Mr. Orange (an undercover cop)
102
+ shoots Mr. Blonde it's a security failure for the crime gang and a success for
103
+ the police. We want to know how to use
104
+
105
+ ( identity, past actions ) => (trust, future actions)
106
+
107
+ If you can predict someone is a vandal or troll, don't let them change pages, or
108
+ only let them post to Ye Flaming Pitte of Flamage.
109
+
110
+ We can to reasonable satisfaction authenticate a token: only grant that
111
+ identity to visitors who bear that token. So this part is fine:
112
+
113
+ person (token)<- identity
114
+
115
+ But we have no control over authentication token - identity correspondence.
116
+ This part is broken:
117
+
118
+ person x (token)<- identity
119
+
120
+ The only one who does have that control is the person behind that identity.
121
+ They can reasonably guarantee
122
+
123
+ person ->(token)<- identity
124
+
125
+ If that person is going to be in your community, they have an interest in their
126
+ identity: they want to be known as someone who isn't a punk, or doesn't troll,
127
+ or does troll and better than anyone, or won't rat you out to the cops. The
128
+ actions of a person are moderated by their interest in maintaining their
129
+ reputation:
130
+
131
+ past actions -> reputation ->person
132
+
133
+ So give up authorization in favor of auditing and recoverability, and authorize
134
+ based on reputation -- on the past behavior and vouchsafes offered by the
135
+ identity,
136
+
137
+ reputation -> trust -> permissions ->actions
138
+
139
+ They want to know that they have full control of their identity; among other
140
+ things, privacy and an understanding that nobody can act without permission on
141
+ their behalf. In fact, we can assure that only a token-holder can assume the
142
+ corresponding identity:
143
+
144
+ person ->(token)<->identity ->(trust) actions ->reputation ->person
145
+
146
+ poop
147
+
148
+ reputation ->trust
149
+
150
+
151
+ So we need to
152
+ * Understand and encourage how their security interests aligns with ours,
153
+ * Understand how it doesn't, and be robust in the face of that; and
154
+ * Recover gracefully if it goes wrong.
155
+
156
+ Instead of
157
+
158
+ authorization -> user -> token -> identity
159
+
160
+ we assign roles based on
161
+
162
+ authorization <- trust <- reputation <- identity <- token <- person
163
+
@@ -0,0 +1,126 @@
1
+ Guides to best practices:
2
+ * "The OWASP Guide to Building Secure Web Applications":http://www.owasp.org/index.php/Category:OWASP_Guide_Project
3
+ * "Secure Programming for Linux and Unix HOWTO":http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/web-authentication.html
4
+ * [[http://www.coresecuritypatterns.com/patterns.htm]]
5
+
6
+ ***************************************************************************
7
+ h2. Session resetting
8
+
9
+ Best practices recommend that you regenerate all session tokens (for us, the
10
+ browser session ID and the remember_token cookie) on any privilege change (for
11
+ us, logging in or logging out) -- see http://tinyurl.com/5vdvuq. This release
12
+ properly regenerates remember_token cookies, but does *not* by default
13
+ reset_session.
14
+
15
+ Calling reset_session can interact with Form Authentication tokens (a *much*
16
+ more important security feature). If a visitor logs in but has a form open in
17
+ another tab, or uses the back button to pull one up from their history (perhaps
18
+ the one that required them to log in), they will get the exceedingly unpleasant
19
+ Request Forgery error. Imagine spending twenty minutes crafting a devastating
20
+ critique of this week's Battlestar Galactica episode, finding you need to log in
21
+ before posting -- but then getting a Request Forgery when you re-attempt the
22
+ post. Frak! Thus, it's disabled by default.
23
+
24
+ On the other hand, this does moderately reduce your defense-in-depth against a
25
+ "Cross-Site Request Forgery":http://en.wikipedia.org/wiki/CSRF attack. To
26
+ enable session_resetting, look for any
27
+ # reset session
28
+ lines in the app/controllers/session_controller.rb and
29
+ app/controllers/users_controller.rb and uncomment them.
30
+
31
+ ***************************************************************************
32
+ h2. Site Key
33
+
34
+ A Site key gives additional protection against a dictionary attack if your
35
+ DB is ever compromised. With no site key, we store
36
+ DB_password = hash(user_password, DB_user_salt)
37
+ If your database were to be compromised you'd be vulnerable to a dictionary
38
+ attack on all your stupid users' passwords. With a site key, we store
39
+ DB_password = hash(user_password, DB_user_salt, Code_site_key)
40
+ That means an attacker needs access to both your site's code *and* its
41
+ database to mount an "offline dictionary attack.":http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/web-authentication.html
42
+
43
+ It's probably of minor importance, but recommended by best practices: 'defense
44
+ in depth'. Needless to say, if you upload this to github or the youtubes or
45
+ otherwise place it in public view you'll kinda defeat the point. Your users'
46
+ passwords are still secure, and the world won't end, but defense_in_depth -= 1.
47
+
48
+ Please note: if you change this, all the passwords will be invalidated, so DO
49
+ keep it someplace secure. Use the random value given or type in the lyrics to
50
+ your favorite Jay-Z song or something; any moderately long, unpredictable text.
51
+
52
+ ***************************************************************************
53
+ h2. Password stretching
54
+
55
+ If someone were to capture your user accounts database, they could farm it out
56
+ for brute-force or dictionary-attack password cracking. "Password Stretching"
57
+ makes brute force (even with a compromised database and site key) attacks
58
+ harder, and scales with Moore's law. Basically, you apply the password
59
+ encryption process several times, meaning that each brute-force attempt takes
60
+ that much longer. Hash your password ten times, and a brute-force attack takes
61
+ ten times longer; hash 100,000 times and an attack takes 100,000 times longer.
62
+
63
+ bq. "To squeeze the most security out of a limited-entropy password or
64
+ passphrase, we can use two techniques [salting and stretching]... that are so
65
+ simple and obvious that they should be used in every password system. There
66
+ is really no excuse not to use them. ... Choose stretching factor so computing
67
+ K from (salt, passwd) takes 200-1000 ms. Store r with the user's password, and
68
+ increase it as computers get faster." -- http://tinyurl.com/37lb73
69
+ Practical Security (Ferguson & Scheier) p350
70
+
71
+ Now, adding even a 0.2s delay to page requests isn't justifiable for most online
72
+ applications, and storing r is unnecessary (at least on your first design
73
+ iteration). But
74
+ On a 1G Slicehost already under moderate load:
75
+ irb(main):005:0> puts Time.now; (10**6).times{ secure_digest(Time.now, rand) }; puts Time.now
76
+ Fri May 16 08:26:16 +0000 2008
77
+ Fri May 16 08:30:58 +0000 2008
78
+ => 280s/1M ~= 0.000_3 ms / digest
79
+ A modest 10 (the default here) foldings makes brute forcing, even given the site
80
+ key and database, 10 times harder at a 3ms penalty. An app that otherwise
81
+ serves 100 reqs/s is reduced to 78 signin reqs/s; an app that does 10reqs/s is
82
+ reduced to 9.7 signin reqs/s
83
+
84
+ * http://www.owasp.org/index.php/Hashing_Java
85
+ * "An Illustrated Guide to Cryptographic Hashes":http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
86
+
87
+ The default of 10 is a reasonable compromise, but the security-paranoid and
88
+ resource-rich may consider increasing REST_AUTH_DIGEST_STRETCHES to match the
89
+ one-second best-practices value, while those with existing userbases (whose
90
+ passwords would otherwise no longer work) should leave the value at one.
91
+
92
+ ***************************************************************************
93
+ h2. Token regeneration
94
+
95
+ The session and the remember_token should both be expired and regenerated
96
+ every time we cross the logged out / logged in barrier by either password
97
+ or cookie. ("To reduce the risk from session hijacking":http://www.owasp.org/index.php/Session_Management#Regeneration_of_Session_Tokens
98
+ and brute force attacks, the HTTP server can seamlessly expire and
99
+ regenerate tokens. This decreases the window of opportunity for a replay or
100
+ brute force attack.) It does mean we set the cookie more often.
101
+
102
+ http://www.owasp.org/index.php/Session_Management#Regeneration_of_Session_Tokens
103
+ http://palisade.plynt.com/issues/2004Jul/safe-auth-practices/
104
+
105
+
106
+ ***************************************************************************
107
+ h2. Field validation
108
+
109
+ We restrict login names to only contain the characters
110
+ <nowiki>A-Za-z0-9.-_@</nowiki> This allows (most) email addresses and is safe
111
+ for urls, database expressions (the at sign, technically reserved in a url, will
112
+ survive in most browsers). If you want to be more permissive:
113
+ * "URL-legal characters":http://www.blooberry.com/indexdot/html/topics/urlencoding.htm are <nowiki>-_.!~*'()</nowiki>
114
+ * "XML-legal characters":http://www.sklar.com/blog/archives/96-XML-vs.-Control-Characters.html are <nowiki>Char ::= #x9 | #xA | #xD | [#x20-#xD7FF] | [#xE000-#xFFFD] | [#x10000-#x10FFFF]</nowiki>
115
+ * "Email-address legal characters":http://tools.ietf.org/html/rfc2822#section-3.4.1 are <nowiki>0-9a-zA-Z!#\$%\&\'\*\+_/=\?^\-`\{|\}~\.</nowiki> but see "this discussion of what is sane"http://www.regular-expressions.info/email.html (as opposed to legal)
116
+
117
+ We restrict email addresses to match only those actually seen in the wild,
118
+ invalidating some that are technically allowed (characters such as % and ! that
119
+ date back to UUCP days. The line to allow all RFC-2822 emails is commented out,
120
+ so feel free to enable it, or remove this validation. See "this discussion of
121
+ what is sane"http://www.regular-expressions.info/email.html as opposed to what
122
+ is legal. Also understand that this is just a cursory bogus-input check --
123
+ there's no guarantee that this email matches an account or is even well-formed.
124
+
125
+ If you change these validations you should change the RSpec tests as well.
126
+
@@ -0,0 +1,49 @@
1
+ See also
2
+ * "Trustlet Wiki":http://www.trustlet.org/wiki
3
+
4
+ Potential Ingredients for a trust metric
5
+
6
+ h2. Reputation
7
+
8
+ * Web of trust
9
+ * Reputation systems
10
+ ** Akismet, Viking, etc.
11
+
12
+ * prove_as_human Completing a
13
+ * validate_email
14
+
15
+ logged_in
16
+ akismet, etc.
17
+ session duration
18
+
19
+ h2. Accountability
20
+
21
+ Does the person tied to this identity stand to lose or gain anything based on this action?
22
+
23
+
24
+ h2. Past history
25
+
26
+ * past history
27
+ ** we can revisit past trust decisions based on revised trust estimates
28
+ * recency of errors (reduce trust on an application exception)
29
+
30
+ h2. Commitment
31
+
32
+ * are_you_sure -- ask for con
33
+ * willingness to pay a "hate task" (compute big hash) a la Zed Shaw
34
+ * send_me_one_cent a micropayment
35
+ ** shows commitment
36
+ ** secondary validation from payment system
37
+ ** offsets rist
38
+
39
+ h2. Identity Binding
40
+
41
+ * Stale sessions
42
+ bq. "If your application allows users to be logged in for long periods of time
43
+ ensure that controls are in place to revalidate a user’s authorization to a
44
+ resource. For example, if Bob has the role of “Top Secret” at 1:00, and at
45
+ 2:00 while he is logged in his role is reduced to Secret he should not be able
46
+ to access “Top Secret” data any more." -- http://www.owasp.org/index.php/Guide_to_Authorization
47
+
48
+ * how I authenticated: for instance, 'logged in by cookie' << 'logged in by password'
49
+
@@ -0,0 +1,3 @@
1
+ require File.join(File.dirname(__FILE__), "..", "lib", "authentication")
2
+ require File.join(File.dirname(__FILE__), "..", "lib", "authentication", "by_password")
3
+ require File.join(File.dirname(__FILE__), "..", "lib", "authentication", "by_cookie_token")