#20869: Prevent repetitive output to counter BREACH-type attacks
-------------------------------+--------------------------------------
     Reporter:  patrys         |                    Owner:  nobody
         Type:  Uncategorized  |                   Status:  new
    Component:  contrib.csrf   |                  Version:  1.5
     Severity:  Normal         |               Resolution:
     Keywords:                 |             Triage Stage:  Unreviewed
    Has patch:  0              |      Needs documentation:  0
  Needs tests:  0              |  Patch needs improvement:  0
Easy pickings:  0              |                    UI/UX:  0
-------------------------------+--------------------------------------

Comment (by patrys):

 What is the exact purpose of the XOR? If you can predict the pad then you
 already have enough information to BREACH the rest of the string. If the
 pad is truly random then there is no benefit from XOR. Random prefix could
 also be easily applied to all the HTTP-only cookies (like session ID).

-- 
Ticket URL: <https://code.djangoproject.com/ticket/20869#comment:2>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/064.fa43c6f79ec40435c9c281702a026c5c%40djangoproject.com.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to