[ 
https://issues.apache.org/jira/browse/TINKERPOP-2700?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Cole Greer closed TINKERPOP-2700.
---------------------------------
    Fix Version/s: 3.6.8
                   3.7.3
         Assignee: Cole Greer
       Resolution: Fixed

> WebSocket compression may lead to attacks (CRIME / BREACH)
> ----------------------------------------------------------
>
>                 Key: TINKERPOP-2700
>                 URL: https://issues.apache.org/jira/browse/TINKERPOP-2700
>             Project: TinkerPop
>          Issue Type: Improvement
>          Components: driver, python
>    Affects Versions: 3.5.2
>            Reporter: Florian Hockmann
>            Assignee: Cole Greer
>            Priority: Blocker
>             Fix For: 3.6.8, 3.7.3
>
>
> As noted in TINKERPOP-2682, WS compression can make an application vulnerable 
> to attacks. That is why it should probably be disabled if an application 
> sends sensitive data as well as data that could be controlled by a 
> potentially untrusted user.
> So, we should make it possible for users to disable compression and inform 
> about this problematic in our docs.
> We can optionally also disable compression ourselves for messages that 
> contain an authentication response (that's how it's implemented right now for 
> .NET in the PR for TINKERPOP-2682).



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to