#20869: Prevent repetitive output to counter BREACH-type attacks
-------------------------------+--------------------------------------
Reporter: patrys | Owner: nobody
Type: Uncategorized | Status: new
Component: contrib.csrf | Version: 1.5
Severity: Normal | Resolution:
Keywords: | Triage Stage: Unreviewed
Has patch: 0 | Needs documentation: 0
Needs tests: 0 | Patch needs improvement: 0
Easy pickings: 0 | UI/UX: 0
-------------------------------+--------------------------------------
Comment (by patrys):
What is the exact purpose of the XOR? If you can predict the pad then you
already have enough information to BREACH the rest of the string. If the
pad is truly random then there is no benefit from XOR. Random prefix could
also be easily applied to all the HTTP-only cookies (like session ID).
--
Ticket URL: <https://code.djangoproject.com/ticket/20869#comment:2>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
--
You received this message because you are subscribed to the Google Groups
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/django-updates/064.fa43c6f79ec40435c9c281702a026c5c%40djangoproject.com.
For more options, visit https://groups.google.com/groups/opt_out.