Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeArchived Discus...Archived Discus...Developing Under Previous Versions of .NETDeveloping Under Previous Versions of .NETASP.Net 2.0ASP.Net 2.0SSL Security and DotNetNukeSSL Security and DotNetNuke
Previous
 
Next
New Post
1/13/2007 7:20 PM
 
You are right, this is not possible but it is not most definitely a DNN flaw. It is IIS that does not allow a site app to use more than one certificate.

Do you know the truth when you hear it?
Néstor Sánchez
The Dúnadan Raptor -->Follow Me on Twitter Now!
 
New Post
1/13/2007 9:04 PM
 

hooligannes 2.0 wrote
You are right, this is not possible but it is not most definitely a DNN flaw. It is IIS that does not allow a site app to use more than one certificate.

I see things considerably different, IIS came before DNN; DNN was built out of ASP.NET and intended to run on IIS; DNN *could* be designed in such a way that it could use multiple websites but the decision was made not to do so.  It would seem like if the application shared components of DotNetNuke.DLL were put into a different DLL that exposed its functions as shared (static) capabilities; that the issue of having multiple instances of the DotNetNuke.dll per website would not matter, because multiple running compies of the code in that dll would call the same in-memory functions and not cause a performance hit.

I am hoping that this thread will draw the attention of the Core team to begin a discussion about what can be done to overcome this weakness.  As is, the architecture and design of DotNetNuke actually encourages sites to put up insecured ecommerce systems that are sending credit card and other confidential information over the internet in clear text.  Many unknowning end users may not understand that - assuming that any platform released in this day in age would automatically be securing such information.

If there is a discussion about this elsewhere; or if I could communicate with a core team member about how I might be able to contribute to getting on the right path regaurding this issue; I would like to be made aware of the discussion or contacted by somebody about what I can do to help.  As is, it seems I will need to come up with some kind of solution for myself; and this seems critical enough that it should be a concern of many.  The idea that host passwords are being submitted as unsecured postbacks would worry everyone out there.  Consider that many DotNetNuke sites are hosted on shared servers - and rouge code executed on another site in that server could easily gain access to the unencrypted data coming in and out of that server.

Again, perhaps my understanding of the system just falls short; if this is the case, please somebody shed some light on this subject for me.

Thanks for the posts that have been already made.

 
New Post
1/13/2007 10:06 PM
 

 

Are you saying there is an issue with DNN because you can point more than one IIS website to the same binary files?  If so, I don't see the risk.  As Hooligannes pointed out, each application loads it's own copy into memory.

Also, any ASP.Net can be configured this way.

I do agree about the sending passwords in clear text to the server though.  I have SSL on my login for that, but I think that all passwords should also be hashed and not encrypted so that the clear text password is not passed between db server and app.


DotNetNuke Modules from Snapsis.com
 
New Post
1/13/2007 10:19 PM
 
John Mitchell wrote

 Are you saying there is an issue with DNN because you can point more than one IIS website to the same binary files?  If so, I don't see the risk.  As Hooligannes pointed out, each application loads it's own copy into memory.

No, I'm saying that the problem is that all DotNetNuke installation articles and best practices discussed around the community are that a single installation and IIS website can provide the capability to support multiple portals, and that using this style if implementation is missleading in that it is not possible to provide SSL Security for more than one portal using this architecture.

It has been Identified in this thread that the only possible way to provide SSL Security for multiple portals in the same DNN application is actually to create multiple IIS websites that point to the same root DNN folder; but that this approach is not well tested (I had never even heard or thought of the approach before this thread) and that performance implications come along with it - in that now it's not really one application that is executing, but multiple - just to support SSL on more than one portal.

If we could overcome the performance issues by changing the architecture around a bit, this may remove the performance implication and then I feel that this way of hosting (one IIS configured website PER portal) is what should be used as a best practice because it is in fact the only way to provide ecrypted capabilities to more than one portal in a single DNN application; and that the general populous may overlook this if it is not address better in installation articles and how-tos.

I do agree about the sending passwords in clear text to the server though.  I have SSL on my login for that,

If this is the case then you must only have SSL on your login for a single portal, is this correct?  I'm just making sure we're in the same page.

 

 

but I think that all passwords should also be hashed and not encrypted so that the clear text password is not passed between db server and app.

Using encrypted passwords and not hashed passwords still means that clear text passwords are not passed between the db server and the app.  DNN currently successfully does not send clear text passwords between the web server and the db server.  I would agree with you that perhaps the DEFAULT implementation should use hashed passwords instead of encrypted passwords, as hashed passwords are stronger in that they are not reversible;  One of the first things I do on all of my installations is to change the authorization provider settings to HASHED instead of ENCRYPTED.

 
New Post
1/13/2007 10:42 PM
 

 

Right, there is no way in IIS to provide SSL to multiple domain names on the same IIS website.

This has nothing to do with DNN.

If you need SSL you should probably provide a unique install as best practice, but I don't see where the performance hit would come from if you pointed more than one IIS site at the same install.
If you do point them to the same install then you have other security weaknesses, they share the same DB and Login for example.
Regardless, there is no change in DNN architecture that could accomplish this that I know of, it is just how SSL works with IIS.

Now, another way to provide SSL to multiple portals is to have them all in the same domain.  You can do this with different hostnames like portal.mydomain.com, or portal2.mydomain.com.
to do that you would need to get a wildcard SSL certificate that would work on all hosts in the domain.

You are correct about the encryption on passwords between DB and APP, my bad.

 


DotNetNuke Modules from Snapsis.com
 
Previous
 
Next
HomeHomeArchived Discus...Archived Discus...Developing Under Previous Versions of .NETDeveloping Under Previous Versions of .NETASP.Net 2.0ASP.Net 2.0SSL Security and DotNetNukeSSL Security and DotNetNuke


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out