It's a common problem, one that has cropped up many times for me over the last few years. You build a secure system, locked up behind a login so that only authenticated users can access the tightly-controlled data, and everything's fine - and then you come to the RSS feeds.
Simply put, RSS feeds and the corresponding use-case of syndicating data out of the application into another application - be it a desktop RSS reader, a web-based aggregator, or even another context within the same system - is in direct contradiction to your security. You can't have an RSS reader log in to your app using the standard login form, and most readers certainly don't support cookies, so you have to provide a bypass.... but what mechanism?
I've tried numerous approaches - most often HTTP AUTH (which some readers support, but not many) or an encrypted url token.
HTTP AUTH is somewhat like an old faithful, it's been around forever, every web server and browser worth mentioning has supported it for years, and it's simple to implement. But it has the disadvantage that once authenticated, the only way to log out is to close your browser completely. Also, many RSS readers don't support it.
Encrypting the users security credentials into a token that you can pass on the URL, is guaranteed to work on anything that can pass on a url correctly, but it has the disadvantage that then anyone who gets access to that url, to all intents and purposes, is that user - so you still have to be careful what you expose in the feed itself.
The main thing, as ever, is to establish exactly what behaviour is "intended". If the brief is for the user to be able to copy-and-paste RSS urls into readers / emails / other sites, then make sure everyone is clear on the implications of that - you're essentially allowing people and / or applications to impersonate a user without going through the login process.
Requirements, of course, vary wildly from app to app, but the approach I've tended to settle on is a combination of multiple methods - if there is a cookie identifying the user, then use that to establish ID, else if you have HTTP AUTH credentials, use them, authenticating appropriately as required. But remember that if you are dealing with automatic requests from readers via HTTP AUTH or encrypted tokens, you should ALWAYS clear out any session variables at the end of the request, otherwise you can quickly end up with thousands of persistent sessions for no apparent reason
4 comments:
I'm dealing with this "dillema". Yours considerations was very helpful. thanks.
Nice thoughts. I guess I'm gonna provide two links to my users: one with theire ID and another with a token. They can choose whichever they want. :)
I found the following article [1] which might be an alternative to your proposal. What do you think about it?
[1] http://www.xml.com/pub/a/2005/07/13/secure-rss.html
Hi Josep
It's a nice approach, for that particular use case - but it is limited to just Firefox users (still a fairly small percentage) and just those Firefox users who have Greasemonkey and know how to use it.
So that's geeks, essentially. Which may be great if that's the majority of your user base, but most of the time that's just not the case.
Al
Post a Comment