Thanks for the info!

Brian

On Mon, Oct 25, 2010 at 8:44 AM, Tom Evans <tevans...@googlemail.com> wrote:

> On Mon, Oct 25, 2010 at 1:17 PM, Brian Bouterse <bmbou...@gmail.com>
> wrote:
> > I'm not an expert in security, but here is how I would answer the
> question.
> >  The CSRF approach that Django 1.2 implements would prevent *most* of
> these
> > problems since the attack wouldn't be able to POST new data to the site
> by
> > stealing the cookie alone.  IBM applies CSRF tags to each step the user
> > interacts with on the entire site, in a technique known as continuations.
> >  These techniques only prevent *most* attacks though, the session can
> still
> > be hijacked just with a reduced window of opportunity.
> > I say *most* because if you can snoop on the HTTP traffic, you
> theoretically
> > could capture the in-plain-text CSRF token the server handed the user
> once
> > they were generated one (from being on a user account to reset my
> password
> > page).  An attacker could form a valid POST using the CSRF just captured
> and
> > I think it would work.
> > Not even validating that the IP is the same for each CSRF would solve the
> > problem either considering these two users are probably going to be in a
> > coffeeshop, behind a NAT.
> > One possible solution would be to have some kind of hardware attestation
> or
> > browser attestation and tie session info to that.  If anyone has any
> > thoughts on how this could be done, please let me know.
> > Brian
> > On Mon, Oct 25, 2010 at 6:47 AM, cootetom <coote...@gmail.com> wrote:
>
> It's actually orthogonal to CSRF. CSRF protects you from a 3rd party
> web site maliciously enticing a user to initiate data changing
> requests to your site. It does nothing to protect a user from having
> their cookies jacked by a 3rd party user, and then stopping that user
> from maliciously using the credentials inferred from those cookies.
>
> That this is even news is surprising - it's hardly a new attack
> vector. The only new thing about it is it being hooked up to a web
> browser and showing live feeds of what is happening, which has
> probably opened the eyes of people who didn't think about it before.
> It's like saying 'Oh wow, you can see in plain text peoples emails on
> unsecured wifi networks' - well, durr, its a plain text protocol, and
> the whole 'unsecured nework' bit should probably give it away...
>
> If you don't want this to happen, then force the use of SSL throughout
> your site, and don't hand out session cookies over HTTP.
>
> Cheers
>
> Tom
>
> --
> You received this message because you are subscribed to the Google Groups
> "Django users" group.
> To post to this group, send email to django-us...@googlegroups.com.
> To unsubscribe from this group, send email to
> django-users+unsubscr...@googlegroups.com<django-users%2bunsubscr...@googlegroups.com>
> .
> For more options, visit this group at
> http://groups.google.com/group/django-users?hl=en.
>
>


-- 
Brian Bouterse
ITng Services

-- 
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-us...@googlegroups.com.
To unsubscribe from this group, send email to 
django-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en.

Reply via email to