Scott Forsyth's Blog
Postings on IIS, ASP.NET, SQL Server, Webfarms and general system admin.
-
Book Review - Building Intelligent .NET Applications
Book Review - Building Intelligent .NET Applications
(Agents, Data Mining, Rule-Based Systems, and Speech Processing)
Sara Morgan Rea -
Enabling Roles in ASP.NET v2.0
By default the Roles provider is defined in machine.config but it isn't enabled. Attempting to use the Roles feature before it is enabled will throw the following error:
-
Encrypting the connection string in ASP.NET V2.0
ASP.Net V2.0 has much improved encryption over v1.x including the ability to encrypt any part of the connection string. Of course there is some performance overhead to do this so only sections that have sensitive information should be encrypted.
-
How to find the SiteID in IIS5 and IIS6
Occasionally I need to explain how to find the SiteID / Site Identifier in IIS5 and/or IIS6 so I thought I would quickly blog on how to do that so that I have a page that I can reference rather than typing it out each time.
-
Book Review - Maximizing ASP.NET
Book Review of Maximizing ASP.NET by Jeffrey Putz
-
Changing the Password Complexity in ASP.NET V2.0
One of the first things many people try with ASP.NET V2.0 (currently in Beta 2) and with the starter kits is to create a new user. Whether it is the CreateUserWizard, a starter kit form or using the membership namespace from code, creating a new profile is going to happen. Immediately following that is often a sigh of frustration when a fairly non-descriptive error occurs: "Please enter a different password." What is that supposed to mean? Is it recommending passwords for us now and not pleased with the one we chose? Did the passwords not match? Even carefully double checking and trying again with a password that is 7 characters and has numbers and upper case and lower case letters triggers this non-descriptive error.
The issue is simply this: ASP.NET V2.0, at the time of writing, has a password complexity requirement of 7 characters and at last 1 non-alphanumeric character. For example, 'Complex592PaSsWoRd' isn't complex enough. A space or a special character is required. Now, being cautious about security is one thing, but many of the V2.0 sites out there now are either test sites, personal or club starter kits or something fairly light. Personally I like to loosen the requirements somewhat, or even loosen them a lot and allow the user to determine how complex they want their password.
Fortunately there are a couple solutions and neither are too complex. The first solution obviously is to enter a more complex password. The second is to override the default complexity requirement and put in your own.
The provider that controls this is the membership provider. This is set by default in the machine.config file on the server. It can be changed at the machine.config file or overridden in the web.config file at the site level.
The two properties that control this are minRequiredPasswordLength and minRequiredNonalphanumericCharacters. They aren't in machine.config by default in the Beta 2 timeframe. I'm not sure if there are plans to change this or not. To override it, simply add them to the <add name="AspNetSqlMembershipProvider" /> section. The minRequiredPasswordLength property must be at least 1, while the minReqiredNonalphanumericCharacters property can be 0. Here is an example of the two lines to add which removes the requirements completely and allows the user to decide on their password. Don't hold me accountable if you open this too much, but I give this example as the other extreme of the default settings.
minRequiredPasswordLength="1"
minRequiredNonalphanumericCharacters="0"
Now, let's say we want to do this at the web.config level. This is easy enough too. The gotcha is that because it already exists at the machine.config level, there will be a clash between the two. So, you must first "remove" the provider set at the machine level and add it back at the site level. To remove the existing one, (I'm assuming default names) you use <remove name="AspNetSqlMembershipProvider" />
Here is an example of a complete web.config file that could be used. If you have an existing web.config file that you want to work this into, take the section between and including <membership> and </membership> and place it in your <system.web> section.
<?xml version="1.0"?>
<configuration xmlns="http://schemas.microsoft.com/.NetConfiguration/v2.0">
<connectionStrings>
<remove name="LocalSqlServer"/>
<add name="LocalSqlServer" connectionString="Data Source=.\SQLExpress;Integrated Security=True;User Instance=True;AttachDBFilename=|DataDirectory|aspnetdb.mdf" />
</connectionStrings>
<system.web>
<membership>
<providers>
<remove name="AspNetSqlMembershipProvider" />
<add name="AspNetSqlMembershipProvider"
type="System.Web.Security.SqlMembershipProvider, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"
connectionStringName="LocalSqlServer"
enablePasswordRetrieval="false"
enablePasswordReset="true"
requiresQuestionAndAnswer="true"
applicationName="/"
requiresUniqueEmail="false"
minRequiredPasswordLength="1"
minRequiredNonalphanumericCharacters="0"
passwordFormat="Hashed"
maxInvalidPasswordAttempts="5"
passwordAttemptWindow="10"
passwordStrengthRegularExpression="" />
</providers>
</membership>
</system.web>
</configuration>
Of course anything in my example can be adjusted however you want as long as it is within an allowed range. Take note especially of the connectionStringName which is referenced in the ConnectionString section of web.config and/or machine.config. If you changed your connection string name, then make sure to update the reference to that connection string there. Another thing to take note of is the connection string in this example. That connection string will only work if Sql Server Express is installed on the server and "user instancing" is enabled. At ORCS Web (www.orcsweb.com) for example, we disable user instancing because of security considerations, create a database when first setting up the site, and provide an alternative connection string which should be used instead.
That's it. Once you set this, you'll be able to have a password that isn't quite so complex. This quick example only briefly covers other considerations like the connectionStringName, user instancing, type of database used and additional properties but I hope it gives enough information to lay the foundation of managing the password complexity within ASP.NET v2.0. -
Troubleshooting email, the Telnet way
Next add the headers and body:
-
What causes ViewState Errors
Since I work for a web host with a high percentage of ASP.NET sites (www.orcsweb.com), I'm frequently asked what causes ViewState errors and how to solve them.
-
URGENT ASP.NET Vulnerability
If you haven't heard of this elsewhere already, please review this immediately:
-
Book Review - Hacking the Code
Book Review: Hacking the Code By: Mark BurnettI can't say enough good things about Mark Burnett's book Hacking the Code. From beginning to end it is a great read and a great resource. What impressed me from the beginning is how he was able to take such a wide range of difficult topics and make them sound so down to earth. The writing style is so polished and friendly that you almost forget that you are reading about pretty intensive topics.I was continually impressed at how well formatted the book was. Now, that almost seems unimportant to mention but it's not. Each section gives the goals of that section, the topic thoroughly covered, and then a summary, worth reading I must add, to close off the section. This impressed me because it is easy to read this from cover to cover and quickly grasp the subject matter. Or, if you are reviewing the section, you can use the summary to be reminded of the key points.VB.Net and C# code examples are plentiful, completely usable and easy to understand.This book is a must read. Even with the topics that I already had a good handle on, I felt that I was continually picking up new pieces of information and being challenged to review the security I already had in place.Hacking the Code is an easy read covering difficult topics in a consistent, complete and concise manner. I highly recommend this book without reservation.