<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sven Strittmatter</title>
    <description>The latest articles on DEV Community by Sven Strittmatter (@weltraumschaf).</description>
    <link>https://dev.to/weltraumschaf</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F356180%2F78cc3838-cb02-4b92-9436-255a879653fa.jpeg</url>
      <title>DEV Community: Sven Strittmatter</title>
      <link>https://dev.to/weltraumschaf</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/weltraumschaf"/>
    <language>en</language>
    <item>
      <title>Credential Stuffing vs Password Spraying</title>
      <dc:creator>Sven Strittmatter</dc:creator>
      <pubDate>Thu, 29 Oct 2020 17:53:39 +0000</pubDate>
      <link>https://dev.to/weltraumschaf/credential-stuffing-vs-password-spraying-2fnc</link>
      <guid>https://dev.to/weltraumschaf/credential-stuffing-vs-password-spraying-2fnc</guid>
      <description>&lt;p&gt;At my &lt;a href="https://www.iteratec.com"&gt;employer&lt;/a&gt; we use Office 365. I'm not an Microsoft advocate. My friends and colleagues rather know me as Apple-Fanboy and BSD-Geek. But I have to admit that Office 365 works good enough. Even in these pandemic times when we work from home Teams and such serves very well.&lt;/p&gt;

&lt;p&gt;As part of our security team we also encounter attacks against our user accounts. Maybe you read about that in the press: There are &lt;em&gt;credential stuffing&lt;/em&gt; and &lt;em&gt;password spray&lt;/em&gt; attacks going on this year against Office 365 accounts. Today I wondered what the concrete difference is between these two types of attacks. Until today I used the terms interchangeably: Its all a kind of brute force, right? No, it's not that easy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Credential Stuffing
&lt;/h2&gt;

&lt;p&gt;This is an attack where an adversary uses a &lt;strong&gt;known pair of username and password&lt;/strong&gt; to gain access. Eg. there is a password leak from the site foobar.com: They stored username and password in plain text. Lot of users use the same username password across many sites. So one could try to use the username and password from foobar.com at Facebook, Twitter or whatever to gain access.&lt;/p&gt;

&lt;p&gt;So &lt;em&gt;credential stuffing&lt;/em&gt; uses a list of known username password combinations to brute-force against an authentication.&lt;/p&gt;

&lt;h2&gt;
  
  
  Password Spraying
&lt;/h2&gt;

&lt;p&gt;In contrast this is an attack where the adversary &lt;strong&gt;only knows the username&lt;/strong&gt; and tries a list of &lt;a href="%5D(https://en.wikipedia.org/wiki/List_of_the_most_common_passwords)"&gt;common or weak passwords&lt;/a&gt; with it. Eg. you know that the usernames at foobar.com are same as the email addresses and you can harvest some of them from the website. Then you use a list of commonly used or weak password (eg. &lt;code&gt;test1234&lt;/code&gt;, &lt;code&gt;password&lt;/code&gt; etc.) together wit the usernames to gain access.&lt;/p&gt;

&lt;p&gt;So &lt;em&gt;password spraying&lt;/em&gt; uses a list of known usernames in combination with commonly known and/or weak passwords to brute-force authentication.&lt;/p&gt;

&lt;p&gt;First posted at &lt;a href="https://blog.weltraumschaf.de/blog/Credential-Stuffing-vs-Password-Spraying/"&gt;https://blog.weltraumschaf.de/blog/Credential-Stuffing-vs-Password-Spraying/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>AuthN vs AuthZ</title>
      <dc:creator>Sven Strittmatter</dc:creator>
      <pubDate>Fri, 23 Oct 2020 10:44:56 +0000</pubDate>
      <link>https://dev.to/weltraumschaf/authn-vs-authz-2h9l</link>
      <guid>https://dev.to/weltraumschaf/authn-vs-authz-2h9l</guid>
      <description>&lt;p&gt;When you do some "login stuff" nowadays you may stumbled upon the  terms &lt;em&gt;AuthN&lt;/em&gt; and &lt;em&gt;AuthZ&lt;/em&gt;. Maybe you wondered what these "N" and "Z" means? Short answer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;AuthN&lt;/em&gt;  stands for &lt;em&gt;Authentication&lt;/em&gt;, and&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;AuthZ&lt;/em&gt; stands for &lt;em&gt;Authorization&lt;/em&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That's easy right? We're done for this blog post 🙃&lt;/p&gt;

&lt;h2&gt;
  
  
  Authentication vs. Authorization
&lt;/h2&gt;

&lt;p&gt;But what is the difference of these two terms? Is it not the same? Short answer: No, it isn't!&lt;/p&gt;

&lt;h3&gt;
  
  
  Authentication
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Authentication&lt;/em&gt; is all about who you are. In the most simple form when you type a username and password somewhere. In a more complex scenario – eg. when you buy a TLS certificate – when you go to a notary showing your identity card.&lt;/p&gt;

&lt;p&gt;So &lt;em&gt;authentication&lt;/em&gt; is the process of verify that you are the person you are pretending to be.&lt;/p&gt;

&lt;h3&gt;
  
  
  Authorization
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Authorization&lt;/em&gt; is all about what you are allowed to do. In the most simple form you are allowed to clone a Git repository and push into it, but you are not &lt;em&gt;authorized&lt;/em&gt; to delete branches in that repository. &lt;em&gt;Authorization&lt;/em&gt; must be granted by an entity which have more rights (is privileged) than you. Eg. when you want to buy a new laptop you request this to your boss and she authorizes this by granting or declining it.&lt;/p&gt;

&lt;p&gt;So &lt;em&gt;authorization&lt;/em&gt; is the process of verify what you are allowed to do.&lt;/p&gt;

&lt;h2&gt;
  
  
  Last Words
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Authentication&lt;/em&gt; can be used without &lt;em&gt;authorization&lt;/em&gt; but vice versa is not possible. To &lt;em&gt;authorize&lt;/em&gt; someone or something – not only natural persons may be &lt;em&gt;authenticated&lt;/em&gt; or &lt;em&gt;authorized&lt;/em&gt;, but also entities like computers, servers, APIs, etc. – it is required to &lt;em&gt;authenticate&lt;/em&gt; first to know who you grant or decline access (&lt;em&gt;authorize&lt;/em&gt;). Eg. when you walk around in a large factory there may be &lt;em&gt;restricted areas&lt;/em&gt; with a security guard protecting it. You must show him your corporate identity card for &lt;em&gt;authentication&lt;/em&gt;. Then the guard looks up in his system if you are allowed to access that ares (&lt;em&gt;authorization&lt;/em&gt;) and grants or declines that you go on.&lt;/p&gt;

&lt;p&gt;First posted at &lt;a href="https://blog.weltraumschaf.de/blog/AuthN-vs-AuthZ/"&gt;https://blog.weltraumschaf.de/blog/AuthN-vs-AuthZ/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>OAuth 2.0 Implicit Flow Considered Harmful</title>
      <dc:creator>Sven Strittmatter</dc:creator>
      <pubDate>Thu, 08 Oct 2020 16:41:26 +0000</pubDate>
      <link>https://dev.to/weltraumschaf/oauth-2-0-implicit-flow-considered-harmful-1l04</link>
      <guid>https://dev.to/weltraumschaf/oauth-2-0-implicit-flow-considered-harmful-1l04</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.weltraumschaf.de/blog/OAuth-Implicit-Flow-Considered-Harmful/"&gt;https://blog.weltraumschaf.de/blog/OAuth-Implicit-Flow-Considered-Harmful/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>oauth</category>
      <category>security</category>
    </item>
    <item>
      <title>Improve Your Documentation With Russian Roulette</title>
      <dc:creator>Sven Strittmatter</dc:creator>
      <pubDate>Mon, 21 Sep 2020 12:34:28 +0000</pubDate>
      <link>https://dev.to/weltraumschaf/improve-your-documentation-with-russian-roulette-43b7</link>
      <guid>https://dev.to/weltraumschaf/improve-your-documentation-with-russian-roulette-43b7</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.weltraumschaf.de/blog/Improve-Your-Documentation-with-Russian-Roulette/"&gt;https://blog.weltraumschaf.de/blog/Improve-Your-Documentation-with-Russian-Roulette/&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Semantic Versioning</title>
      <dc:creator>Sven Strittmatter</dc:creator>
      <pubDate>Fri, 22 May 2020 10:08:09 +0000</pubDate>
      <link>https://dev.to/weltraumschaf/semantic-versioning-29i0</link>
      <guid>https://dev.to/weltraumschaf/semantic-versioning-29i0</guid>
      <description>&lt;p&gt;Please use Semantic Versioning and please use it right!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.weltraumschaf.de/blog/Please-Use-Semantic-Versioning/"&gt;https://blog.weltraumschaf.de/blog/Please-Use-Semantic-Versioning/&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  SemVer
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>Hardening Your SSHd With Ansible</title>
      <dc:creator>Sven Strittmatter</dc:creator>
      <pubDate>Fri, 08 May 2020 12:34:48 +0000</pubDate>
      <link>https://dev.to/weltraumschaf/hardening-your-sshd-with-ansible-2ipj</link>
      <guid>https://dev.to/weltraumschaf/hardening-your-sshd-with-ansible-2ipj</guid>
      <description>&lt;p&gt;I blogged about harding SSHd with Ansible to increase security of your server: &lt;a href="https://blog.weltraumschaf.de/blog/Hardening-Your-SSHd-with-Ansible/"&gt;https://blog.weltraumschaf.de/blog/Hardening-Your-SSHd-with-Ansible/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>sshd</category>
      <category>ansible</category>
    </item>
  </channel>
</rss>
