#20869: Prevent repetitive output to counter BREACH-type attacks
-------------------------------+--------------------------------------
Reporter: patrys | Owner: nobody
Type: Uncategorized | Status: new
Component: contrib.csrf | Version: 1.5
Severity: Normal | Resolution:
Keywords: | Triage Stage: Unreviewed
Has patch: 0 | Needs documentation: 0
Needs tests: 0 | Patch needs improvement: 0
Easy pickings: 0 | UI/UX: 0
-------------------------------+--------------------------------------
Comment (by M):
I note that Django's CSRF token output uses single quotes - value='....' -
whilst form outputs by default use double quotes - value="...".
This means it seems impossible by default to cause a request to reflect
something that would match the same prefix. You would have to guess the
first three characters of the token cold (a large number of requests) in
order to get started.
--
Ticket URL: <https://code.djangoproject.com/ticket/20869#comment:6>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
--
You received this message because you are subscribed to the Google Groups
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/django-updates/064.d8d4ded9b77148e7a7347a39885220d2%40djangoproject.com.
For more options, visit https://groups.google.com/groups/opt_out.