GET https://kbin.spritesserver.nl/u/@xubu@infosec.pub/comments

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
0.44 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.05 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
App\Entity\EntryComment {#2082
  +user: App\Entity\User {#261 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#2369 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1906 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#2023 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#2023 …}
  +body: """
    I’m in IT security and I’m fighting this battle. I want to lessen the burden of passwords and arbitrary rotation is terrible.\n
    \n
    I’ve ran into a number of issues at my company that would give me the approval to reduce the frequency of expired passwords\n
    \n
    - the company gets asked this question by other customers “do you have a password policy for your staff?” (that somehow includes an expiration frequency).\n
    - on-prem AD password complexity has some nice parts built in vs some terrible parts with no granularity. It’s a single check box in gpo that does *way* too much stuff. I’m also not going to write a custom password policy because I don’t have the skill set to do it correctly when we’re talking about AD, that’s nightmare inducing. (Looking at specops to help and already using Azure AD password protection in passive mode)\n
    - I think management is worried that a phishing event happens on a person with a static password and then unfairly conflating that to my argument of “can we just do two things: increase password length by 2 and decrease expiration frequency by 30 days”\n
    \n
    At the end of the day, some of us in IT security want to do the right things based in common sense but we get stymied by management decisions and precedence. Hell, I’ve brought NIST 800-63B documentation with me to check every reason why they wouldn’t budge. It’s just ingrained in them - meanwhile you look at the number of tickets for password help and password sharing violations that get reported … /Sigh
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 24
  +score: 0
  +lastActive: DateTime @1698149493 {#2064
    date: 2023-10-24 14:11:33.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Krudler@lemmy.world"
    "@Cqrd@lemmy.dbzer0.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#2030 …}
  +nested: Doctrine\ORM\PersistentCollection {#2024 …}
  +votes: Doctrine\ORM\PersistentCollection {#2018 …}
  +reports: Doctrine\ORM\PersistentCollection {#2011 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2378 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2379 …}
  -id: 69109
  -bodyTs: "'-63':235 '/sigh':273 '2':190 '30':196 '800':234 'ad':76,134,148 'alreadi':145 'also':108 'approv':41 'arbitrari':21 'argument':178 'ask':52 'azur':147 'b':236 'base':216 'battl':11 'box':97 'brought':232 'budg':248 'built':83 'burden':17 'check':96,241 'common':218 'compani':35,50 'complex':78 'conflat':174 'correct':128 'custom':57,114 'day':197,203 'decis':226 'decreas':192 'document':237 'end':200 'event':162 'everi':242 'expir':47,71,193 'fight':9 'frequenc':45,72,194 'get':51,222,271 'give':38 'go':110 'gpo':99 'granular':91 'happen':163 'hell':229 'help':143,265 'includ':69 'increas':186 'induc':138 'ingrain':252 'issu':32 'length':188 'lessen':15 'look':139,257 'm':2,8,107 'manag':156,225 'meanwhil':255 'mode':153 'much':104 'nice':81 'nightmar':137 'nist':233 'number':30,260 'on-prem':73 'part':82,88 'passiv':152 'password':19,48,62,77,115,149,170,187,264,267 'person':166 'phish':161 'polici':63,116 'preced':228 'prem':75 'protect':150 'question':54 'ran':27 're':131 'reason':243 'reduc':43 'report':272 'right':214 'rotat':22 'secur':5,209 'sens':219 'set':124 'share':268 'singl':95 'skill':123 'somehow':68 'specop':141 'staff':66 'static':169 'stuff':105 'stymi':223 'talk':132 'terribl':24,87 'thing':185,215 'think':155 'ticket':262 'two':184 'unfair':173 'us':206 'use':146 've':26,231 'violat':269 'vs':85 'want':13,210 'way':102 'worri':158 'would':37 'wouldn':246 'write':112"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://infosec.pub/comment/3663074"
  +editedAt: null
  +createdAt: DateTimeImmutable @1698149493 {#2387
    date: 2023-10-24 14:11:33.0 +02:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
App\Entity\EntryComment {#2082
  +user: App\Entity\User {#261 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#2369 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1906 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#2023 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#2023 …}
  +body: """
    I’m in IT security and I’m fighting this battle. I want to lessen the burden of passwords and arbitrary rotation is terrible.\n
    \n
    I’ve ran into a number of issues at my company that would give me the approval to reduce the frequency of expired passwords\n
    \n
    - the company gets asked this question by other customers “do you have a password policy for your staff?” (that somehow includes an expiration frequency).\n
    - on-prem AD password complexity has some nice parts built in vs some terrible parts with no granularity. It’s a single check box in gpo that does *way* too much stuff. I’m also not going to write a custom password policy because I don’t have the skill set to do it correctly when we’re talking about AD, that’s nightmare inducing. (Looking at specops to help and already using Azure AD password protection in passive mode)\n
    - I think management is worried that a phishing event happens on a person with a static password and then unfairly conflating that to my argument of “can we just do two things: increase password length by 2 and decrease expiration frequency by 30 days”\n
    \n
    At the end of the day, some of us in IT security want to do the right things based in common sense but we get stymied by management decisions and precedence. Hell, I’ve brought NIST 800-63B documentation with me to check every reason why they wouldn’t budge. It’s just ingrained in them - meanwhile you look at the number of tickets for password help and password sharing violations that get reported … /Sigh
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 24
  +score: 0
  +lastActive: DateTime @1698149493 {#2064
    date: 2023-10-24 14:11:33.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Krudler@lemmy.world"
    "@Cqrd@lemmy.dbzer0.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#2030 …}
  +nested: Doctrine\ORM\PersistentCollection {#2024 …}
  +votes: Doctrine\ORM\PersistentCollection {#2018 …}
  +reports: Doctrine\ORM\PersistentCollection {#2011 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2378 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2379 …}
  -id: 69109
  -bodyTs: "'-63':235 '/sigh':273 '2':190 '30':196 '800':234 'ad':76,134,148 'alreadi':145 'also':108 'approv':41 'arbitrari':21 'argument':178 'ask':52 'azur':147 'b':236 'base':216 'battl':11 'box':97 'brought':232 'budg':248 'built':83 'burden':17 'check':96,241 'common':218 'compani':35,50 'complex':78 'conflat':174 'correct':128 'custom':57,114 'day':197,203 'decis':226 'decreas':192 'document':237 'end':200 'event':162 'everi':242 'expir':47,71,193 'fight':9 'frequenc':45,72,194 'get':51,222,271 'give':38 'go':110 'gpo':99 'granular':91 'happen':163 'hell':229 'help':143,265 'includ':69 'increas':186 'induc':138 'ingrain':252 'issu':32 'length':188 'lessen':15 'look':139,257 'm':2,8,107 'manag':156,225 'meanwhil':255 'mode':153 'much':104 'nice':81 'nightmar':137 'nist':233 'number':30,260 'on-prem':73 'part':82,88 'passiv':152 'password':19,48,62,77,115,149,170,187,264,267 'person':166 'phish':161 'polici':63,116 'preced':228 'prem':75 'protect':150 'question':54 'ran':27 're':131 'reason':243 'reduc':43 'report':272 'right':214 'rotat':22 'secur':5,209 'sens':219 'set':124 'share':268 'singl':95 'skill':123 'somehow':68 'specop':141 'staff':66 'static':169 'stuff':105 'stymi':223 'talk':132 'terribl':24,87 'thing':185,215 'think':155 'ticket':262 'two':184 'unfair':173 'us':206 'use':146 've':26,231 'violat':269 'vs':85 'want':13,210 'way':102 'worri':158 'would':37 'wouldn':246 'write':112"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://infosec.pub/comment/3663074"
  +editedAt: null
  +createdAt: DateTimeImmutable @1698149493 {#2387
    date: 2023-10-24 14:11:33.0 +02:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
App\Entity\EntryComment {#2082
  +user: App\Entity\User {#261 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#2369 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1906 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#2023 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#2023 …}
  +body: """
    I’m in IT security and I’m fighting this battle. I want to lessen the burden of passwords and arbitrary rotation is terrible.\n
    \n
    I’ve ran into a number of issues at my company that would give me the approval to reduce the frequency of expired passwords\n
    \n
    - the company gets asked this question by other customers “do you have a password policy for your staff?” (that somehow includes an expiration frequency).\n
    - on-prem AD password complexity has some nice parts built in vs some terrible parts with no granularity. It’s a single check box in gpo that does *way* too much stuff. I’m also not going to write a custom password policy because I don’t have the skill set to do it correctly when we’re talking about AD, that’s nightmare inducing. (Looking at specops to help and already using Azure AD password protection in passive mode)\n
    - I think management is worried that a phishing event happens on a person with a static password and then unfairly conflating that to my argument of “can we just do two things: increase password length by 2 and decrease expiration frequency by 30 days”\n
    \n
    At the end of the day, some of us in IT security want to do the right things based in common sense but we get stymied by management decisions and precedence. Hell, I’ve brought NIST 800-63B documentation with me to check every reason why they wouldn’t budge. It’s just ingrained in them - meanwhile you look at the number of tickets for password help and password sharing violations that get reported … /Sigh
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 24
  +score: 0
  +lastActive: DateTime @1698149493 {#2064
    date: 2023-10-24 14:11:33.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Krudler@lemmy.world"
    "@Cqrd@lemmy.dbzer0.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#2030 …}
  +nested: Doctrine\ORM\PersistentCollection {#2024 …}
  +votes: Doctrine\ORM\PersistentCollection {#2018 …}
  +reports: Doctrine\ORM\PersistentCollection {#2011 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2378 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2379 …}
  -id: 69109
  -bodyTs: "'-63':235 '/sigh':273 '2':190 '30':196 '800':234 'ad':76,134,148 'alreadi':145 'also':108 'approv':41 'arbitrari':21 'argument':178 'ask':52 'azur':147 'b':236 'base':216 'battl':11 'box':97 'brought':232 'budg':248 'built':83 'burden':17 'check':96,241 'common':218 'compani':35,50 'complex':78 'conflat':174 'correct':128 'custom':57,114 'day':197,203 'decis':226 'decreas':192 'document':237 'end':200 'event':162 'everi':242 'expir':47,71,193 'fight':9 'frequenc':45,72,194 'get':51,222,271 'give':38 'go':110 'gpo':99 'granular':91 'happen':163 'hell':229 'help':143,265 'includ':69 'increas':186 'induc':138 'ingrain':252 'issu':32 'length':188 'lessen':15 'look':139,257 'm':2,8,107 'manag':156,225 'meanwhil':255 'mode':153 'much':104 'nice':81 'nightmar':137 'nist':233 'number':30,260 'on-prem':73 'part':82,88 'passiv':152 'password':19,48,62,77,115,149,170,187,264,267 'person':166 'phish':161 'polici':63,116 'preced':228 'prem':75 'protect':150 'question':54 'ran':27 're':131 'reason':243 'reduc':43 'report':272 'right':214 'rotat':22 'secur':5,209 'sens':219 'set':124 'share':268 'singl':95 'skill':123 'somehow':68 'specop':141 'staff':66 'static':169 'stuff':105 'stymi':223 'talk':132 'terribl':24,87 'thing':185,215 'think':155 'ticket':262 'two':184 'unfair':173 'us':206 'use':146 've':26,231 'violat':269 'vs':85 'want':13,210 'way':102 'worri':158 'would':37 'wouldn':246 'write':112"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://infosec.pub/comment/3663074"
  +editedAt: null
  +createdAt: DateTimeImmutable @1698149493 {#2387
    date: 2023-10-24 14:11:33.0 +02:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details