Identity and Data Security For Web Development Jonathan Leblanc PDF Download
Identity and Data Security For Web Development Jonathan Leblanc PDF Download
https://ebookbell.com/product/identity-and-data-security-for-web-
development-jonathan-leblanc-5905594
Identity And Data Security For Web Development Best Practices Jonathan
Leblanc
https://ebookbell.com/product/identity-and-data-security-for-web-
development-best-practices-jonathan-leblanc-5471604
https://ebookbell.com/product/access-contested-security-identity-and-
resistance-in-asian-cyberspace-ronald-deibert-5075594
https://ebookbell.com/product/cybersecurity-protecting-your-identity-
and-data-marylane-kamberg-48952404
Trusted Data A New Framework For Identity And Data Sharing Revised And
Expanded Edition Revised And Expanded Thomas Hardjono Editor
https://ebookbell.com/product/trusted-data-a-new-framework-for-
identity-and-data-sharing-revised-and-expanded-edition-revised-and-
expanded-thomas-hardjono-editor-36341478
Mastering Identity And Access Management With Microsoft Azure Empower
Users By Managing And Protecting Identities And Data 2nd Edition
Jochen Nickel
https://ebookbell.com/product/mastering-identity-and-access-
management-with-microsoft-azure-empower-users-by-managing-and-
protecting-identities-and-data-2nd-edition-jochen-nickel-22657756
https://ebookbell.com/product/marketing-to-the-90s-generation-global-
data-on-society-consumption-and-identity-anders-parment-auth-5380776
The Druze In The Middle East Their Faith Leadership Identity And
Status Nissim Dana
https://ebookbell.com/product/the-druze-in-the-middle-east-their-
faith-leadership-identity-and-status-nissim-dana-11371608
https://ebookbell.com/product/little-vast-rooms-of-undoing-exploring-
identity-and-embodiment-through-public-toilet-spaces-dara-
blumenthal-5238944
Identity and Data Security for Web
Development
Best Practices
The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Identity and Data Security for Web
Development, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc.
While the publisher and the author(s) have used good faith efforts to ensure that the information and
instructions contained in this work are accurate, the publisher and the author(s) disclaim all responsibil‐
ity for errors or omissions, including without limitation responsibility for damages resulting from the use
of or reliance on this work. Use of the information and instructions contained in this work is at your own
risk. If any code samples or other technology this work contains or describes is subject to open source
licenses or the intellectual property rights of others, it is your responsibility to ensure that your use
thereof complies with such licenses and/or rights.
978-1-491-93694-8
[FILL IN]
Table of Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
The problems with current security models 1
Poor Password Choices 2
Security Over Usability 3
Improper Data Encryption 4
The weakest link: human beings 5
Single sign-on 6
Understanding Entropy in Password Security 7
Entropy in Randomly Selected Passwords 7
Entropy in Human Selected Passwords 9
Breaking Down System Usage of a Username and Password 11
Securing our current standards for identity 11
Good and bad security algorithms 12
What data should be protected? 13
Account Recovery Mechanisms & Social Engineering 13
The Problem with Security Questions 14
Next up 15
iii
Reverse Lookup Tables 29
Rainbow Tables 30
Salting 32
Generating a Random Salt 32
Salt Reuse 33
Salt Length 33
Where to Store the Salt 34
Peppering 34
Choosing the Right Password Hashing Function 35
bcrypt 36
PBKDF2 37
scrypt 38
Validating a Password Against a Hashed Value 39
Key Stretching 41
Recomputing Hashes 41
Next Steps 42
iv | Table of Contents
Security considerations between OAuth 2 and OAuth 1.0a 67
Building an OAuth 2.0 server 68
Creating the Express application 68
Setting up our server’s database 69
Generating Authorization Codes and tokens 69
The Authorization Endpoint 72
Handling a token’s lifetime 75
Handling Resource Requests 78
Using Refresh Tokens 81
Handling errors 82
Adding OpenID Connect functionality to the server 86
The ID Token Schema 87
Modifying the Authorization Endpoint 88
Adjusting the Token Endpoint 89
The UserInfo Endpoint 91
Session Management with OpenID Connect 91
Building an OAuth 2 Client 91
Using Authorization Codes 92
Authorization using Resource Owner Credentials or Client Credentials 95
Adding OpenID Connect functionality to the client 96
The OpenID Connect Basic flow 97
Beyond OAuth 2.0 and OpenID Connect 98
Table of Contents | v
How Express handles sessions 123
Handling XSS 127
The Three Types of XSS Attacks 127
Testing XSS Protection Mechanisms 127
Conclusion 132
CSRF attacks 132
Handling CSRF with csurf 133
Valuable resources for Node 134
Lusca 134
helmet 135
Node Security Project 135
Other mitigation techniques 136
Our findings 137
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
vi | Table of Contents
Preface
1 http://www.inc.com/will-yakowicz/cyberattacks-cost-companies-400-billion-each-year.html
2 http://cybersecurityventures.com/cybersecurity-market-report/
vii
The true problem is that hacking is no longer just the business of individuals wanting
to prove that they can breach a system, it is now a realm of organized businesses,
hacking for money or to damage the business.
This is where this text comes in. As we explore each chapter and concept, we will be
taking the approach of how to plug holes in existing systems, protect against viable
attack vectors, and how to work in environments that are sometimes naturally inse‐
cure. We’ll look at concepts such as:
In the end, we’ll have a comprehensive understanding of the current state of identity
and data security, knowing how to protect ourselves against potential attacks, and
protecting our users from having the data that they entrusted to us compromised.
Acknowledgments
First of all we would like to thank the O’Reilly crew for publishing this book and ena‐
bling us to share our knowledge, thoughts and opinion with many individuals around
the world. A huge special thanks goes out to our editor Meg Foley, who has been
patient, supportive and helpful throughout the process of finishing this work.
Our thanks also go out to both Lenny Markus, Allen Tom, and Aaron Parecki, who
patiently reviewed this book’s manuscript and helped to improve its quality tremen‐
dously.
We’d also like to thank our developer relations team for proof-reading, providing cri‐
tique and freeing us up to work on this book.
Finally, we’d like to express our gratitude to you, our readers, for buying this book.
We hope you enjoy it!
viii | Preface
Jonathan
I’d like to start out by thanking my partner in crime, Tim, for being an amazing co-
author to work with. Without our continued conversations, building up and breaking
down all of our ideas into new amazing hybrids of their original selves, this book
wouldn’t have been what it is today. Your ideas, drive, and humor made this one of
my favorite experiences.
To my wife Heather, you’ve helped to keep me sane when I decided to write my first
book almost 5 years ago. Despite the fact that I forgot how much time away that took,
you stood by me when I decided to write another one. Without you, I could not have
kept my sanity and drive throughout this process. You have always been by my side to
encourage me to chase my dreams. You’ve been my biggest advocate through all of
this, and I love you for that.
To my daughter Scarlett, throughout the time that I have had to pleasure to be your
father, you have brought a calming effect into my life. With constant chaos, you have
allowed me to see that the world doesn’t have to be as serious as I used to think it was.
You’ve brought a peace into my life that I will always thank you for.
To my group, my friends. We may all go our separate ways, be split through compa‐
nies and across the world, but I will always see you as some of my closest friends. We
have been through so much together, and have sacrificed a lot. Despite all that, you
have been our supporters through everything we have gone through, boosting us up,
allowing us to succeed. Thank you.
Tim
I’d like to thank Jonathan, who’s not only been a fantastic colleague and friend, but
also a great co-author on this book. It was brilliant to be able to bounce ideas and
thoughts back and forth and I am positive that the book would have been far less
interesting without your influence, support and work.
My wife, Karin, deserves a huge thank you - and probably an even bigger bouquet of
flowers - for granting me all the time I needed in order to finish my work on this
book.
Joe Nash, Alan Wong, Steven Cooper and Cristiano Betta have been a fantastic team
throughout the time of authoring this book and deserve to be mentioned here.
I am grateful for everyone that encouraged me to write this piece and saw me ram‐
bling about security concepts and usability concepts on various stages.
A special mention goes to Danese Cooper, PayPal’s Head of Open Source, who highly
animated me to write down my thoughts beyond blog posts.
Preface | ix
Finally, I would like to thank both John Lunn and Taylor Nguyen, who supported me
tremendously in writing this book and gave me support and advice throughout my
career.
x | Preface
CHAPTER 1
Introduction
One of the most important investments that you can make in a system, company, or
application, is in your security and identity infrastructures. We can’t go a week
without hearing about another user customer breach, stolen credit cards, or identity
theft. Even though you can put an entire series of hurdles in the way of a potential
attacker, there will always exist a possibility that your databases will be breached,
information will be stolen, and an attacker will begin attempting to crack the sensitive
data that was stored (if encrypted).
There is no bulletproof, secure method for protecting your data, identity and data
security has always been about mitigating risk, protecting the secure data, and buying
yourself enough time to take action and reduce damage if something like this should
ever happen to you.
As we dive down into the concepts, technology, and programming methodologies
behind building a secure interface for data and identity. We’re explore the decisions,
tradeoffs, and core concepts that you will need to understand as you embark on mak‐
ing those final decisions about your security.
As we begin, the best place to start is in exploring what the major problems with data
security and identity are in the industry right now.
1
that they wouldn’t pick the most usable choice over the easiest one. We, as developers,
have to protect our users in the same way that we try to protect our systems, and we
must assume that the user will not do that for themselves.
What this means is that we have to purge a few misconceptions from our heads:
• The user will always use the most secure options: The simple fact is that the
worst thing you can rely on is that the user will be capable, or willing, to use the
option that will secure them and their data. The onus has to be on the site or ser‐
vice owner to ensure that data provided by the user for their security (such as a
password) is hardened to ensure that minimum levels of security are imposed
(see more about data encryption and security in Chapter 2). For instance, when
two-factor authentication services are offered, a typical adoption rate is approxi‐
mately between 5-10% of users.
• We should always make systems more secure, at the cost of usability: This is
typically one of the reactions to the last point, to make a system as secure as pos‐
sible, at the cost of usability of the system for the user. This is simply not the case,
there are numerous mechanisms that can be put in place to enhance security
without drastically affecting the user. We’ll explore this further below.
• Our security will never be breached: From startups to large companies, many
engineers have put too much faith in the security of their systems. What this has
lead to is lax data encryption standards, meaning that personal and privileged
information, such as credit card data, home addresses, etc, are stored as cleartext,
data that is not encrypted in any way. When the system is breached, hackers have
to put in no effort to capture and use that data.
Always assume your data will be stolen and use proper data encryption
In June, 2015, a massive breach of US government data was said to
expose the personal information on millions of government work‐
ers, since the data itself was not encrypted (source: Computer
World). No matter how big you are, you should always assume that
the possibility exists that your database security will be breached,
and data stolen. All sensitive information should always be prop‐
erly encrypted.
Let’s drill down into some of these issues a bit further to see the cause and effect of the
choices we make as users and developers.
2 | Chapter 1: Introduction
compiled by SplashData from files containing millions of stolen passwords that have
been posted online during the previous year.
Before we get too far up in arms about people choosing these passwords, there are
many issues with the data sets that we need to be aware of:
• Since most of this data comes from information leaks, it could be that these pass‐
words are just easier to crack through dictionary or brute force attacks.
• We don’t know the sources of much of this data, so we can’t validate the security
measures in place on the sites or services.
• The data may contain anomalies, or simply bad data. If a default password is
being set by a service with a lot of leaked data (and never changed), it will push it
higher. If we are analyzing data from multiple different sources using informa‐
tion that was poorly parsed, or has those anomalies, the list will be skewed.
With that said, even though those passwords may be a smaller number than the lists
purport them to be, and the data may be highly skewed, they still exist. What this
means, when building a data and identity security system, is that you have to provide
an adequate level of protection for these people. Typically, you want to build for the
weakest possible authentication system, which, depending on your security require‐
ments, might be comprised of this list.
In many ways this is because of what we expect of people when they are creating a
password: provide a password with mixed case, at least one symbol & number, noth‐
ing recognizable in a dictionary or guessable from those who know you. These types
of expectations create poor usability for the user, where they won’t be able to remem‐
ber the password, and also ensures that they either pick the easiest way they can to
enter the site, or write down that complex password on a post-it note on their display.
Usability needs to be a part of identity security for it to be effective.
The concept of usability versus security is always a balancing act. You need to ensure
that you have a high enough confidence in the security of your users, and at the same
time do as much behind the scenes so that the user isn’t forced to break out of the
experience of your site to continually verify themselves.
Some of the questions that we can ask ourselves, when thinking this through, are:
• Can I obtain identity information to increase my confidence that the user is who
they say they are, without imposing additional security checks on the user?
• If I have a high confidence that the user is who they say they are, can I build a
more usable experience for that user versus one that I have no confidence in?
• What content requires user identification, and when should I impose additional
levels of security to verify that?
We’ll explore these concepts further in Chapter 3, as we learn about trust zones and
establishing identity information on a user.
4 | Chapter 1: Introduction
your password could be recreated from the hashed form.”. In addition, following this
incident, they introduced two factor authentication for users, as well as a password
kill switch for team owners that automatically logged out all users, on all devices, and
forced them to create a new password.
In the above case, data encryption and quick action prevented a massive theft of user
accounts, and lessened the damage to their credibility and the confidence their users
had in them. Data encryption isn’t always about trying to prevent data from being
stolen, it’s meant to slow down hackers from decrypting the data long enough to
make it either infeasible for them to decrypt massive amounts of data, or delay them
until you can take appropriate action.
More and more services like 1Password, Dashlane or LastPass offer to generate pass‐
words for their users. This removes the need to come up with a secure password and
is often seen as a convenient way to speed up user account registration.
Katie Sherwin, a member of the Nielsen Norman Group, released an article 1 about
simplifying password authentication flows and listed these three approaches as a way
to improve user experience:
By applying these three rules we can ensure that users feel comfortable about the
passwords they use and get a clear indication about the password’s strength itself.
Further research indicates that users that see a strength meter choose more secure
passwords - even if the strength indicator is not implemented that well2.
Those who saw a meter tended to choose stronger passwords than those who didn’t,
but the type of meter did not make a significant difference.3
—Dinei Florencio, Cormac Herley and Paul C. van Oorschot, An Administrator’s
Guide to Internet Password Research
Single sign-on
Single sign-on, also known as SSO, is a technology that leverages existing user
accounts in order to authenticate against various services. The idea behind this con‐
cept is prefilling and securing a central user account instead of forcing the user to
register at a variety of services over and over again.
Common choices that try to accommodate the wish to reuse user profiles to either
provide profile information or to simply authenticate against other services include
OpenID, OAuth 1.0, OAuth 2.0 and various hybrid models like OpenID Connect. In
1 http://www.nngroup.com/articles/password-creation
2 http://research.microsoft.com/pubs/227130/WhatsaSysadminToDo.pdf
3 http://research.microsoft.com/pubs/227130/WhatsaSysadminToDo.pdf
6 | Chapter 1: Introduction
Chapter 4 we will focus on a selection of authentication techniques and will discuss
both the technical implementation details as well as the security implications.
Using the information above, password entropy, expressed in bits, is used to predict
how difficult it would be for the password to be cracked through guessing, dictionary
attacks, brute force cracking, etc.
When you are looking at determining overall password entropy, there are two main
ways of generating passwords that we should explore: randomly generated passwords
(computer generated), and human selected passwords.
To come up with the value of b, we can simply choose the symbol set that we are
using from the list below.
The symbol set you might not be familiar with above is the dice‐
ware word list. The method behind diceware is to use a single die
(from a pair of dice), and roll it 5 times. The numeric values on the
die each time create a 5 digit number (e.g. 46231, matching the
value of each individual roll). This number is then used to look up
a word from a given word list. There are 7776 possible unique
words using this method. See the diceware word list for the com‐
plete reference.
Using the formula, length of the password, and numbers of symbols in a given sym‐
bol set, you can estimate the bits of entropy from a randomly generated password.
8 | Chapter 1: Introduction
Exploring the Variety of Random
Documents with Different Content
BOOK EIGHTH.
THE SWISS.
1484-1522.
CHAP. I.
Movements in Switzerland—Source of the Reformation—
Democratic Character—Foreign Service—Morality—The
Tockenburg—An Alpine Hut—A Pastoral Family.
The good amman was delighted with the happy presages in his son.
He perceived that Ulric would be able to do something else than
herd his cows on Mount Sentis, singing the shepherd's song. One
day he took him by the hand and proceeded with him towards
Wesen. He traversed the verdant ridges of the Ammon, avoiding the
wild and precipitous rocks which border the lake of Wallenstadt. On
arriving at the town, he called upon his brother the dean, to whom
he intrusted the young mountaineer, in order that he might ascertain
what his talents were.[611] The leading feature in his character was
an innate horror at falsehood and a great love of truth. He himself
relates that one day, when he was beginning to reflect, the thought
struck him that falsehood should be punished more severely than
even theft; "for," adds he, "veracity is the parent of all the virtues."
The dean soon loved his nephew as if he had been his son;
delighted with his sprightliness, he entrusted his education to a
schoolmaster who in a short time taught him all that he knew
himself. Young Ulric, when ten years of age, having given indications
of a high order of intellect,[612] his father and his uncle resolved on
sending him to Bâle.
When the child of the Tockenburg arrived in this celebrated city, with
an integrity and purity of heart which he seemed to have inhaled
from the pure air of his mountains, but which came from a higher
source, a new world opened before him. The celebrity of the famous
council of Bâle; the university which Pius II had founded in 1460;
the printing presses, which revived the master-pieces of antiquity,
and circulated over the world the first fruits of the revival of letters;
the residence of distinguished men; the Wessels, the Wittembachs,
and, in particular, that prince of scholars and luminary of the
schools, Erasmus, rendered Bâle, at the period of the Reformation,
one of the great foci of light in the west.
Ulric entered the school of St. Theodore, which was
taught by Gregory Binzli, a man of an affectionate ZUINGLIUS AT
BALE. AT BERNE.
and gentle temper, at this period rare among DOMINICAN
teachers. Young Zuinglius made rapid progress. CONVENT.
The learned disputes which were then fashionable
among the doctors of universities had even descended to the youth
in schools. Ulric took part in them. He exercised his growing strength
against the children of other schools, and was always victorious in
those struggles which formed a kind of prelude to those by which
the papacy was to be overthrown in Switzerland.[613] His success
excited the jealousy of rivals older than himself. The school of Bâle
was soon outstripped by him as that of Wesen had been.
Lupulus, a distinguished scholar, had just opened at Berne the first
learned school that was founded in Switzerland. The bailiff of
Wildhaus and the curate of Wesen resolved to send their child
thither, and Zuinglius, in 1497, quitting the smiling plains of Bâle,
again drew near to the high Alps, where he had spent his childhood,
and whose snowy tops, gilded with the rays of the sun, he could see
from Berne. Lupulus, a distinguished poet, introduced his pupil to
the sanctuary of classic literature, a sanctuary then unknown, only a
few of the initiated having passed the threshold.[614] The young
neophyte ardently breathed an atmosphere rich in the perfumes of
antiquity. His intellect was developed and his style formed. He
became a poet.
Among the convents of Berne, that of the Dominicans held a
distinguished place. These monks were engaged in a serious quarrel
with the Franciscans. The latter maintained the immaculate
conception of the virgin, while the former denied it. In every step
the Dominicans took—before the rich altars which decorated their
church, and between the twelve pillars on which its arches were
supported—they thought only of humbling their rivals. They had
observed the fine voice of Zuinglius, and heard of his precocious
intellect, and thinking that he might throw lustre on their order,
strove to gain him.[615] With this view they invited him to remain in
their convent till he should make his noviciate. The whole prospects
of Zuinglius were threatened. The amman of Wildhaus having been
informed of the bait to which the Dominicans had had recourse,
trembled for the innocence of his son, and ordered him forthwith to
quit Berne. Zuinglius thus escaped those monastic enclosures into
which Luther rushed voluntarily. What happened afterwards may
enable us to comprehend the imminent danger to which Zuinglius
had been exposed.
In 1507 great excitement prevailed in the town of
Berne. A young man of Zurzach, named John JETZER.
APPARITIONS.
Jetzer, having one day presented himself at this
same Dominican convent, had been repulsed. The poor youth in
despair had returned to the charge, holding in his hand fifty-three
florins and some pieces of silk. "It is all I possess," said he, "take it,
and receive me into your order." He was admitted on the 6th
January among the lay brothers. But the very first night a strange
noise in his cell filled him with terror. He fled to the Carthusian
convent, but was again sent back to that of the Dominicans.
On the following night, being the eve of the feast
of St. Matthew, he was awoke by deep sighs, and IMPOSTURE.
perceived at his bedside a tall phantom in white. "I
am," said a sepulchral voice, "a soul escaped from the fire of
purgatory." The lay brother trembling, replied, "God save you; for
me, I can do nothing." Then the spirit advanced towards the poor
friar and, seizing him by the throat, indignantly upbraided him with
his refusal. Jetzer in terror exclaimed, "What then can I do to save
you?" "Flagellate yourself for eight days till the blood comes, and lie
prostrate on the pavement of the chapel of St. John." So answered
the spirit, and disappeared. The lay brother gave information of the
apparition to his confessor, a preacher of the convent, and by his
advice submitted to the discipline required. The rumour soon spread
throughout the town that a soul had applied to the Dominicans to be
delivered from purgatory. The Franciscans were deserted, and every
one ran to the church to see the holy man lying prostrate on the
ground. The soul from purgatory had intimated that he would
reappear in eight days. On the night appointed it in fact did appear,
accompanied by two other spirits that were tormenting it and
howling horribly. "Scotus," said the spirit, "Scotus, the inventor of
the Franciscan doctrine of the immaculate conception of the Virgin,
is among those who like me are suffering these fierce pains." At this
news, which soon spread over Berne, the partisans of the
Franciscans were still more alarmed. The spirit on disappearing had
announced a visit from the Virgin herself. In fact, on the day
appointed, the astonished friar saw Mary herself appear in his cell.
He could not believe his eyes. She approached him kindly, gave him
three of our Saviour's tears, three drops of his blood, a crucifix, and
a letter addressed to Pope Julius II, "who," said she, "was the
individual chosen by God to abolish the festival of her pretended
immaculate conception." Then coming still closer to the bed on
which the friar lay, she announced, in a solemn tone, that a great
grace was to be conferred on him, and drove a nail into his hand.
The lay brother uttered a loud shriek, but Mary wrapt up his hand in
a piece of linen which her Son, she said, had worn after his flight
into Egypt. This wound was not sufficient to make the glory of the
Dominicans equal to that of the Franciscans. Jetzer must have the
five wounds of Christ and of St. Francis in his hands, feet, and side.
The four others were inflicted, and then, after giving him a draught,
he was placed in a hall hung with pictures representing our Saviour's
passion. Here having spent whole days fasting, his imagination soon
became heated. The doors of the hall were then thrown open from
time to time to the public who came in crowds to contemplate with
devout astonishment the friar with his five wounds, stretching out
his arms, bending his head, and by his positions and gestures
imitating the crucifixion of our Lord. Sometimes, out of his wits, he
foamed, and seemed about to breathe his last. The whisper went
round, "He is enduring the cross of Christ." The multitude, eager for
miracles, continually thronged the convent. Men worthy of high
esteem, among others Lupulus himself, the master of Zuinglius,
were overawed, and the Dominicans, from the height of the pulpit
extolled the glory which God was bestowing on their order.
This order had for some years felt the necessity of humbling the
Franciscans, and of augmenting the respect and liberality of the
people by means of miracles. Berne, "a simple, rustic, and ignorant
town," as the sub-prior of Berne described it to the Chapter held at
Wimpfen on the Necker, had been selected as the theatre of their
operations. The prior, sub-prior, preacher, and purveyor of the
convent, had undertaken to perform the leading characters, but they
wanted the talent necessary to perform them to the end. A new
apparition of Mary having taken place, Jetzer thought he recognised
the voice of his confessor, and having said so aloud, Mary
disappeared. She soon made her appearance again, to censure the
incredulous friar. "This time it is the prior," exclaimed Jetzer, rushing
forward with a knife in his hand. The saintess threw a pewter plate
at the poor friar's head, and likewise disappeared.
In consternation at the discovery which Jetzer had
thus made, the Dominicans tried to disencumber ZUINGLIUS AT
VIENNA AND
themselves of him by means of poison. He BALE.
perceived it; and, having taken flight, disclosed the
imposition. They put on a good countenance, and sent deputies to
Rome. The pope committed the decision to his legate in Switzerland,
and the bishops of Lausanne and Sion. The four Dominicans being
convicted, were condemned to be burnt alive; and on the 1st May,
1509, were consumed by the flames, in presence of more than thirty
thousand spectators. The affair made a noise throughout Europe,
and by unveiling one of the worst sores of the Church, prepared the
Reformation.[616]
Such were the men into whose hands Ulric Zuinglius had nearly
fallen. He had studied literature at Berne; he behoved now to devote
himself to philosophy, and with this view repaired to Vienna. A youth
from St. Gall, named Joachim Vadian, whose genius gave promise to
Switzerland of a distinguished scholar and a statesman; Henri Loreti,
of the canton of Glaris, commonly called Glarean, and apparently
destined to shine among poets; John Heigerlin, son of a forgemaster,
and hence surnamed Faber, of a versatile temper, fond of honour
and glory, possessing all the qualities indicative of a courtier—such
were Ulric's fellow-students and companions in the capital of Austria.
Zuinglius returned to Wildhaus in 1502; but on revisiting his
mountains he felt that he had drunk of the cup of science, and could
no longer live amid the songs of his brothers and the bleating of
their flocks. He was eighteen years of age, and repaired to Bâle,[617]
to engage again in literary pursuits, and thus at once master and
pupil he taught at the school of St. Martin, and studied at the
university; from this time he was able to dispense with assistance
from his father. Shortly after, he took the degree of master of arts.
An Alsatian, named Capito, nine years older than he, was one of his
best friends.
Zuinglius devoted himself to the study of scholastic
theology; for, being called one day to combat its WITTEMBACH.
ZUINGLIUS AND
sophisms, he behoved to explore its obscure LEO JUDA.
labyrinth. But the light hearted student of the
mountains of Sentis was often seen suddenly to shake off the dust
of the school, and, substituting amusement for his philosophic toils,
seize the lute, or the harp, or the violin, or the flute, or the
tympanon, or the cornet, or the hunting horn, extract joyous sounds
from these instruments as in the prairies of Lisighaus, and make his
lodgings, or the dwellings of his friends, re-echo with the airs of his
country, accompanying them with his voice. In regard to music, he
was a true child of the Tockenburg, superior to all.[618] In addition to
the instruments we have already named, he played several others.
An enthusiast in the art he diffused a taste for it in the university,
not from any desire of dissipation, but because he loved thus to
relax his mind when fatigued by serious study, and fit himself for
returning with greater zeal to difficult labours.[619] None had a gayer
humour, a more amiable disposition, or more engaging conversation.
[620] He was a vigorous Alpine tree which developed itself in all its
gracefulness and strength, and which, never having been pruned,
threw out strong branches in all directions. The time was coming
when these branches would turn vigorously in the direction of
heaven.
After he had forced an entrance into scholastic theology he left its
arid tracts fatigued and disgusted, having found nothing in it but
confused ideas, vain babbling, vain glory, barbarism, and not one
sound idea of doctrine. "It is only a loss of time," said he, and
waited for something better.
At this time, (November, 1505,) arrived at Bâle Thomas Wittembach,
son of a burgomaster of Bienne. Wittembach had till then taught at
Tubingen, side by side with Reuchlin. He was in the vigour of life,
sincere, pious, skilled in the liberal arts, and mathematics, and well
acquainted with the Holy Scriptures. Zuinglius and all the academic
youth immediately flocked around him. A spirit hitherto unknown
animated his lectures, and prophetic words escaped from his lips:
"The time is not distant," said he, "when scholastic theology will be
abolished and the ancient doctrine of the Church restored."[621]
"The death of Christ," added he, "is the only ransom of our souls."
[622] The heart of Zuinglius eagerly received these seeds of life.[623]
At this period classical studies began every where to supplant the
scholastics of the middle age. Zuinglius, like his preceptors and
friends, threw himself into this new course.
Among the students who followed the lessons of the new teacher
with the greatest enthusiasm was a young man of twenty-three, of
small stature, and a feeble sickly appearance, but whose eye
bespoke at once gentleness and intrepidity. This was Leo Juda, son
of an Alsatian curate, and whose uncle had fallen at Rhodes, fighting
in defence of Christendom, under the standard of the Teutonic
knights. Leo and Ulric were on intimate terms. Leo played the
tympanon, and had a very fine voice. The joyous melodies of the
young friends of the arts were often heard in his lodgings. Leo Juda,
at a later period, became the colleague of Zuinglius, and even death
could not destroy their sacred friendship.
At this time the office of pastor of Glaris having
become vacant, Henry Goldli, a young courtier of ZUINGLIUS
BECOMES
the pope, and groom of the stable to his holiness, CURATE OF
obtained the appointment from his master, and GLARIS.
hastened with it to Glaris. But the Glarian
shepherds, proud of the antiquity of their race, and of their battles
for freedom, were not disposed to bow implicitly to a piece of
parchment from Rome. Wildhaus is not far from Glaris; and Wesen,
where Zuinglius' uncle was curate, is the place where the market of
the district is held. The reputation of the young master of arts of
Bâle had penetrated even into these mountains; and the Glarians,
wishing to have him for their priest, gave him a call in 1506.
Zuinglius having been ordained at Constance by the bishop,
preached his first sermon at Rapperswil, read his first mass at
Wildhaus on St. Michael's day, in presence of all his relations and the
friends of his family, and towards the close of the year arrived at
Glaris.
CHAP. III.
Love of War—Schinner—Pension from the Pope—The Labyrinth
—Zuinglius in Italy—Principle of Reform—Zuinglius and
Luther—Zuinglius and Erasmus—Zuinglius and the Elders—
Paris and Glaris.
ebookbell.com