While implementing cookies for Mget (https://github.com/rockdaboot/mget) 
conforming to RFC 6265, I stubled over http://publicsuffix.org/ (Mozilla 
Public Suffix List).

Looking at Wget sources discovers, that there is just a very incomplete check 
for public suffixes. That implies a very severe vulnerability to "supercookie" 
attacks when cookies are switched on (they are by default).

Since Mget was ment as a Wget2 candidate (all or parts of the sources), please 
feel free to copy the needed sourcecode from it (see cookie.c/cookie.h and 
tests/test.c for test routines). Right now, I just don't have the time to do 
the work, but of course I will answer your questions.

ShouldN't there be a warning within the docs / man pages.
What do you think ?

Regards, Tim

Reply via email to