Introduction to ASP.Net Viewstate

Post on 06-May-2015

5.334 views 2 download

description

Introduction to ASP.Net Viewstate by Dhiraj Ranka @ null Mumbai Meet, November, 2010

Transcript of Introduction to ASP.Net Viewstate

Introduction to ASP.NET ViewState

- By Dhiraj Ranka (NII Consulting)

HTTP Protocol

• Stateless • Uses cookies, sessions to maintain state• Where is ViewState in picture?

ASP.NET Page life cycle

• verifying file access rights• resurrecting the user's session state(HTTP modules)

Page Life Cycle events

View State

• persist state across post backs• store name and value pairs• “What sort of state needs to be persisted?”• in instantiation stage, control hierarchy is

created• For example,<asp:Label runat="server" Font-Name="Verdana" Text="Hello, World!"></asp:Label>

The View State Property• Every control can stores its state• Examplepublic string NavigateUrl {

get { string text = (string) ViewState["NavigateUrl"]; if (text != null) return text; else return string.Empty; } set { ViewState["NavigateUrl"] = value; }

}

• whenever a control's property is read, the control's ViewState is consulted

Storing Information in the Page's ViewState Property

• persist page-specific and user-specific information across postbacks

• Code would look like – ViewState[keyName] = value

• example - creating a pageable, sortable DataGrid• sort expression must be persisted across

postbacks

The Cost of View State

• Nothing comes for free, and view state is no exception

• two performance hits for every request– In save view state control hierarchy is saved in base-64

encoded string which is emitted in “__VIEWSTATE” hidden form field and in load view state the same is decoded and control hierarchy is updated

– extra size to the Web page. Some times for view state-heavy pages can be tens of kilobytes

Enabling/Disabling ViewState

• At control level– <asp:Label EnableViewState=“false”…></asp:Label>

• At individual page level– <%@Page EnableViewState="False" %>– Page.EnableViewState = false;

• At site/application level (in web.config)– <pages enableViewState="true">

View State and Security Implications

• Its nothing but base-64 encoded string• Attacker can easily decode it, manipulate and

encode back before sending it

Prevention

• Tamper proofing• Encryption• The ViewStateUserKey Property

Tamper Proofing

• Use a machine authentication check, or MAC• It ensure that the data received by a computer

is the same data that it transmitted• hashing the view state data and appending

this hash to the end of the view state• When post back occurs it checks to ensure

that the appended hash matches up with the hashed value

• default hashing algorithm used is SHA1 (MD5)

Generic Error

Encryption• To encrypt the view state, set the

<machineKey> element's validation attribute in the machine.config file to 3DES– Can be SHA1, MD5, AES

• the <machineKey> element contains validationKey and decryptionKey attributes

• validationKey attribute for MAC• decryptionKey attribute for 3DES• Default values are “AutoGenerate,IsolateApp”

Concerns with Encryption

• Previous settings works fine with single web server

• In web farm, it's vital that all Web servers use the same keys for MAC and/or encryption and decryption

• Use shared key among all web servers

The ViewStateUserKey Property

• Must be assigned a string value in initialization stage(Page_Init event)

• User-specific value as username, but can be guessable

• Recommended value is SessionID• Code would look this (Page_Init event)– Page.ViewStateUserKey = Session.SessionID;

• Attacker(Evil Bob) requests a page• Server salting ViewState hash

using attacker’s username(Evil Bob)

• Attacker tricks Normal user(Alice) to request server passing in his view state

• Web server notices that Alice’s ViewStateUserKey(“Alice”) doesn’t match up with the appended key (“Evil bob”) – Exception is thrown

Thank you