[ https://issues.apache.org/jira/browse/TINKERPOP-2700?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Cole Greer closed TINKERPOP-2700. --------------------------------- Fix Version/s: 3.6.8 3.7.3 Assignee: Cole Greer Resolution: Fixed > WebSocket compression may lead to attacks (CRIME / BREACH) > ---------------------------------------------------------- > > Key: TINKERPOP-2700 > URL: https://issues.apache.org/jira/browse/TINKERPOP-2700 > Project: TinkerPop > Issue Type: Improvement > Components: driver, python > Affects Versions: 3.5.2 > Reporter: Florian Hockmann > Assignee: Cole Greer > Priority: Blocker > Fix For: 3.6.8, 3.7.3 > > > As noted in TINKERPOP-2682, WS compression can make an application vulnerable > to attacks. That is why it should probably be disabled if an application > sends sensitive data as well as data that could be controlled by a > potentially untrusted user. > So, we should make it possible for users to disable compression and inform > about this problematic in our docs. > We can optionally also disable compression ourselves for messages that > contain an authentication response (that's how it's implemented right now for > .NET in the PR for TINKERPOP-2682). -- This message was sent by Atlassian Jira (v8.20.10#820010)