Wikipedia:Articles for deletion/LDAP injection


 * The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review).  No further edits should be made to this page.

The result was keep. (non-admin closure) – Davey 2010 Talk 00:22, 17 December 2016 (UTC)

LDAP injection

 * – ( View AfD View log  Stats )

I speedied this unsourced contextless and WP:How-to article as non-notable, but admin contests that, so I've brought it here for the community to decide Jimfbleak -  talk to me?  13:12, 9 December 2016 (UTC)


 * Keep, good enough for a start class article. Let's take those complaints one at time:
 * Unsourced. Yes, the page was unsourced, but there are dozens of books on LDAP and network security that can easily verify all the material in the article.
 * Contextless. The opening sentence of the article clearly states that this is in the context of LDAP being used for malicious code injection into web based applications.  For anyone who does not understand those terms, it is only necessary to add those wikilinks to the article.
 * How-to. I see no evidence that the page is a HOWTO, nor has the proposer offered any, despite being asked on his talk page.
 * Non-notable. As point #1, there are dozens of books;
 * Practical Spring LDAP has a page on subject
 * Security Strategies in Web Applications and Social Networking has a three-paragraph section
 * Network Security Assessment has at least a page (I can't access it all)
 * Distributed Systems Security 3-paragraph section
 * Network and Application Security Section running for most of a page
 * PCI Compliance: The Definitive Guide more than a page
 * The Web Application Hacker's Handbook five pages
 * Numerous other books have a paragraph or two (see the search results at point #1). There are also scholarly papers on the subject:
 * "LDAP Injection Techniques", IEEE
 * "LDAP Injection & Blind LDAP Injection"
 * Literally hundreds of other papers at least mention this form of attack, if not discuss it in depth. Additionally, the Web Application Security Consortium has a lengthy article on its website. SpinningSpark 14:36, 9 December 2016 (UTC)


 * Keep A WP:BEFORE style search shows multiple in-depth independent reliable sources; Spinningspark listed a number of them above. Thus this topic is notable per WP:GNG. The article was in rough shape; I cleaned it up a little and added a few general reliable sources. It still needs a good bit of work, but with all the RS, it has WP:SURMOUNTABLE problems. A notable topic and an article that can be improved suggests keeping the article. --Mark viking (talk) 00:12, 10 December 2016 (UTC)
 * Note: This debate has been included in the list of Computing-related deletion discussions. North America1000 15:20, 10 December 2016 (UTC)
 * Note: This debate has been included in the list of Internet-related deletion discussions. North America1000 15:20, 10 December 2016 (UTC)


 * Keep, plainly. Spinningspark's list of reliable sources is more than enough to settle the question. Chiswick Chap (talk) 17:24, 10 December 2016 (UTC)


 * The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.