DEV Community

Cover image for Authentication and Authorization: A Tale of Security, Flaws, and Fixes 🏴‍☠️
akash
akash

Posted on

Authentication and Authorization: A Tale of Security, Flaws, and Fixes 🏴‍☠️

Introduction

Ah, authentication and authorization — the Zoro and Sanji of the web security world. While authentication ensures you're who you say you are, authorization checks if you're allowed to board the Thousand Sunny. But just like the Grand Line, the digital world is full of surprises (and flaws).

In this blog, we’ll dive into the challenges of implementing these systems, the common pitfalls we encountered in a real-world application, and, of course, the pirate solutions that saved the day. Along the way, we’ll make sure every developer, whether fresh-faced or experienced, can follow the logic and apply it to their own projects. 🏴‍☠️


Observations: The Flaws That Lurk in the Shadows 🕵️‍♂️

1. Weak Token Security 🔐

  • Tokens were being generated without explicitly setting a signing algorithm. This leaves the door open for attackers to tamper with tokens.
  • Avoid setting expiry times to overly long durations, like one month. It’s like leaving your treasure map out for anyone to grab over an extended period.

2. Session Hijacking

  • Session IDs lacked randomness. Imagine handing out sequential keys to the Thousand Sunny — it wouldn’t take long for someone to guess the next one.
  • While device-specific validation was implemented, it’s not enough without truly random session IDs to secure each user.

3. Error Handling ⚠️

  • Error messages were revealing too much information. For example, telling users “Invalid password” instead of “Invalid credentials” helps attackers figure out what’s wrong.

4. Brute Force Protection ⚔️

  • Some sensitive endpoints had rate limiting, but others were left open to repeated attack attempts. Think of it as locking your treasure chest but leaving your ship’s door wide open.

5. Role Validation 🎭

  • Some endpoints didn’t consistently check user roles. If roles like “captain” or “first mate” weren’t properly validated, it could lead to unauthorized crew members taking control of the ship.

6. IDOR (Insecure Direct Object Reference) 🕵️‍♂️

  • There were no checks to ensure users could only access their own data. For example, if Usopp could see Zoro’s bounty just by changing a URL parameter, that’s a classic IDOR vulnerability.

Solutions: The Pirate's Toolkit 🦸‍♂️

1. Token Security 🔑

  • Always explicitly set a signing algorithm (like HS256 or RS256) when generating JWTs. This ensures tokens are secure and tamper-proof.
  • Reduce the expiry time to 15 minutes, and introduce refresh tokens for longer sessions. Short-lived tokens minimize the risk of misuse if a token is stolen.

Example Code:

const jwt = require('jsonwebtoken');

// Secure token generation
const token = jwt.sign(payload, secretKey, { algorithm: 'HS256', expiresIn: '15m' });
const refreshToken = jwt.sign(payload, secretKey, { expiresIn: '7d' });
Enter fullscreen mode Exit fullscreen mode

2. Session Hijacking Prevention 🔐

  • Generate truly random session IDs using libraries like uuid. These IDs should be impossible to predict.
  • Use a caching system like Redis to validate sessions quickly, reducing database load and improving performance.

Example Code:

const storeSession = async (userId, sessionId) => {
    await redisClient.set(`session:${userId}:${sessionId}`, 'valid', 'EX', 1800); // 30 min TTL
};

const validateSession = async (userId, sessionId) => {
    const isValid = await redisClient.get(`session:${userId}:${sessionId}`);
    if (!isValid) throw new Error('Session invalid or expired');
};
Enter fullscreen mode Exit fullscreen mode

3. Error Handling 🛑

  • Use generic error messages to avoid giving attackers clues about what went wrong. For example:
    • Instead of “Invalid password,” use “Invalid credentials” to make brute force attacks harder.

4. Brute Force Protection 🛡️

  • Apply rate limiting to all sensitive endpoints, not just login.
  • Add CAPTCHA for endpoints with repeated failed requests to block automated attacks.

Example Code:

const rateLimit = require('express-rate-limit');

const limiter = rateLimit({
    windowMs: 1 * 60 * 1000, // 1 minute
    max: 5, // limit each IP to 5 requests per windowMs
    message: 'Too many requests, please try again later.',
});

app.use('/api/auth', limiter);
Enter fullscreen mode Exit fullscreen mode

5. Role Validation 🎭

  • Always check user roles before granting access to sensitive endpoints. For example, ensure only captains can access the ship’s command deck.

What is Role Validation?

Role validation ensures that users can only perform actions or access resources based on their assigned roles. For example:

  • A regular crew member shouldn’t access the captain’s quarters.
  • A quartermaster might have access to inventory but not the helm.

Example Code:

const hasRequiredRole = (userRoles, requiredRoles) => {
    return requiredRoles.some((role) => userRoles.includes(role));
};

if (!hasRequiredRole(user.roles, ['captain', 'first mate'])) {
    throw new Error('Unauthorized');
}
Enter fullscreen mode Exit fullscreen mode

6. IDOR Prevention 🔍

  • Validate that the requesting user owns the resource they’re trying to access. This ensures users can’t tamper with URLs or data to access someone else’s information.

Example Code:

const validateOwnership = async (userId, resourceId) => {
    const resource = await db.findById(resourceId);
    if (!resource || resource.ownerId !== userId) {
        throw new Error('Unauthorized access');
    }
};
Enter fullscreen mode Exit fullscreen mode

Lessons Learned: Why This Matters 🎓

Building secure systems isn’t just about checking boxes; it’s about thinking like Buggy the Clown (but not becoming him). Every minor oversight is an opportunity for exploitation, and every fix is a step closer to a safer application.

When designing security, think about all the ways an attacker might exploit the system. Always question whether the checks in place are robust enough to stop them. And don’t forget to involve your crew — collaboration and peer reviews are essential.


Closing Thoughts 🏁

Security is a journey, not a destination. Start with the basics, iterate often, and always keep an eye on emerging threats. After all, in the world of web development, even the smallest flaw can open the gates to the Grand Line’s most notorious pirates.

Keep coding, stay secure, and maybe reward yourself with some meat on the bone like Luffy! 🍖


Happy securing!

Top comments (0)