Skip to main content

All Questions

0votes
0answers
258views

store strings in db with asymmetric encryption for a python app keeping the data secure

I'm designing an app that receives sensitive data input from a user and that data needs to be saved securely in a database. As far as I understand it needs asymmetric encryption but since this app has ...
mic f's user avatar
15votes
3answers
3kviews

Does python's pip provide cryptographic authentication and integrity validation?

Does python's pip package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I see a lot of guides ...
Michael Altfield's user avatar
3votes
1answer
3kviews

Proper implementation of JWT authentication in mobile app

I'm building a mobile app that connects to a Python Flask API and backend. Currently, I am using JWTs for authentication. The expiration of the token is set to be 6 months in advance. The thing ...
Caleb H.'s user avatar
1vote
0answers
390views

Is it secure to start a NTLM handshake not knowing if the server supports it?

I am writing a program in Python using the requests-ntlm library. That library adds support for NTLM in regular requests: import requests from requests_ntlm import HttpNtlmAuth requests.get("http://...
J. Doe's user avatar
0votes
1answer
796views

django-python3-ldap Does TLS Encrypt AD Passwords When Site is Hosted on http

I have implemented django-python3-ldap and integrated AD with my Django project. The project will be hosted on IIS as an intranet site that is served solely over http. I am deciding between using this ...
OverflowingTheGlass's user avatar
0votes
1answer
378views

Authenticating services with PKI (pycrypto)

so I'm trying to solve an issue at work. We have a popular key value store which does security via tokens. The kv store issues a specific token which dictates which clients can query which keys. I ...
Louis_Santos's user avatar
5votes
1answer
2kviews

How to to make a file private by securing the url that only authenticated users can see

I was wondering if there is a way to secure an image or a file to be hidden when it is not authenticated. Suppose there is an image in my website which can only be seen if that user is authenticated. ...
Robin's user avatar
6votes
1answer
2kviews

Unusual design aspects of AWS HMAC-based authentication, v4

I am designing a RESTful API in python. I want to use HMAC authentication. I could not find any suitable HMAC libraries, so I am rolling my own. However I want to use a well-known standard such as AWS ...
octagonC's user avatar
5votes
1answer
6kviews

Using client certificates for website authentication

I was wondering if there currently exists a Content Management System that supports PKI and client certificates for website authentication instead of username/passwords. If not, what's a good place to ...
Python Novice's user avatar
2votes
1answer
237views

After having confirmed a computer is infected by a Botnet.

And having found a server IP that is controlling it. How can I find out the log-in credentials this client uses to log in to a IRC channel / server webpage / control panel. I have found out a python ...
Cookie-Man's user avatar
-3votes
1answer
1kviews

What are some good user login/authentication libraries or protocols to use with Python on Google App Engine? [closed]

I've read elsewhere (http://forums.udacity.com/questions/6028436/bcrypt-not-suitable-for-pythongae) that bcrypt is not suitable for use on Google App Engine. What are some good ways to create a user ...
michaelrbock's user avatar
3votes
3answers
3kviews

Proper Linux user authentication through PAM aware applications

Currently I'm building an authentication system using Linux PAM for a python daemon process. It will need to authenticate remote users from a variety of front-ends against the local user list. (...
Zimrilim's user avatar

close