#20869: Prevent repetitive output to counter BREACH-type attacks
-------------------------------+--------------------------------------
     Reporter:  patrys         |                    Owner:  nobody
         Type:  Uncategorized  |                   Status:  new
    Component:  contrib.csrf   |                  Version:  1.5
     Severity:  Normal         |               Resolution:
     Keywords:                 |             Triage Stage:  Unreviewed
    Has patch:  0              |      Needs documentation:  0
  Needs tests:  0              |  Patch needs improvement:  0
Easy pickings:  0              |                    UI/UX:  0
-------------------------------+--------------------------------------

Comment (by M):

 I note that Django's CSRF token output uses single quotes - value='....' -
 whilst form outputs by default use double quotes - value="...".
 This means it seems impossible by default to cause a request to reflect
 something that would match the same prefix. You would have to guess the
 first three characters of the token cold (a large number of requests) in
 order to get started.

-- 
Ticket URL: <https://code.djangoproject.com/ticket/20869#comment:6>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/064.d8d4ded9b77148e7a7347a39885220d2%40djangoproject.com.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to