[Zope-dev] Re: [patch] More secure cookie crumbler?
Tres Seaver
tseaver at zope.com
Tue Apr 13 01:37:39 EDT 2004
Jamie Heilman wrote:
> Chris Withers wrote:
>
>>The patch means that auth creds are never sent, only an auth token that's
>>valid for 20 mins or so, or you could set it to less.
>
>
> The token *is* the cred in that scenario, you can't not send some form
> credentials.
>
>
>>Can you explain the XSS risk when a client user is not permitted to write
>>HTML content to be stored by the app?
>
> The malicious code doesn't have to be stored in the app being
> attacked. Typically its part of a URI pointing to the app to attack
> and includes the xss payload. That URI however could be found any
> number of places... social engineering usually comes into play then to
> get the victim to click on it. While its typically easier to convince
> users to click a link if it comes from the same site it appears to be
> going to, (think about message board systems like slash where where
> hyperlinks in comments are usually suffixed by [domain.com] to give
> the user the ability to avoid goatse and such) in the end, what
> dictates the likelyhood of attack is the value of the service more
> than anything. [Sadly this doesn't dictate the likely hood of XSS
> holes getting reported on security lists, where people frequently post
> every about silly little backwater application they can find.]
Yup. I worry hard about XSS when it comes to my banking, my credit
cards, my taxes; I don't much care when it comes to a news site.
>>>restrictions, etc. but few people will go through the trouble, and I'd
>>>wager most people using the various cookie-based auth folder products
>>>don't even know the risks.
>>
>>This I'd agree with, but I find the argument "this car's breaks only let me
>>stop in 1 mile, so there's no point in changing them so I can stop in 0.5
>>miles" a poor one...
>
>
> Well, knock yourself out, I mean, clearly auth techniques based around
> cookies need a lot of additional protection. Those same protections,
> if written modularly, can usually be used to bolster HTTP auth as
> well, so there's no harm in writing them. Its convincing people to
> actually use the damned things thats the problem.
Right, mostly for the same reasons you point out above: the perceived
threat isn't enough to warrant the pain.
--
===============================================================
Tres Seaver tseaver at zope.com
Zope Corporation "Zope Dealers" http://www.zope.com
More information about the Zope-Dev
mailing list