On Fri, 12 May 2000, Jay Jacobs wrote:

> The issue isn't the technical aspects of the bug, or even the fact that
> users don't have to turn off cookies to fix the bug... the issue is that
> this, with help from the talented press, will cause more people to simply
> disable cookies whether right or wrong.  

I second that.

> This ties back into a previous discussion about storing sessions (or
> session_id) in a cookie and how reliable (or unreliable) that is.

I think a hybrid of cookie/URI_embedding is the only way to go. If a user
supports cookie, shoot it out, if not rewrite URIs. I know it sucks but
JavaScript and HTML designers are always developing a different version of 
their work for each platform...

> Jay Jacobs
> LachNet Inc.
> 
> 
> On Fri, 12 May 2000, Keith G. Murphy wrote:
> 
> > "Jeffrey W. Baker" wrote:
> > > 
> > > On Thu, 11 May 2000, Marc Slemko wrote:
> > > 
> > > > In reality, IE's recently publicized hole (which I reported to them, in a
> > > > slightly modified form, months ago but they didn't see fit to release a
> > > > patch...) doesn't change much.
> > > >
> > > > Hotmail?  Yahoo mail?  amazon.com?  etc.  Your cookies for all those sites
> > > > are vulnerable anyway due to the "cross site scripting" issue.  This
> > > > particular hole in IE doesn't change things too much.  Sure, there may be
> > > > the rare site that isn't vulnerable to cross site scripting.  But that is
> > > > the very rare site, and most sites that think they aren't vulnerable are.
> > > >
> > > > Cookies are not secure and will never be secure.  I have said it before
> > > > and will say it again many times before I die.  Unfortunately, it isn't as
> > > > simple as saying "well, don't use cookies".  There isn't much in the way
> > > > of alternatives for a lot of things...
> > > 
> > > Cross-site scripting attacks are hard for most people to wrap their minds
> > > around.  There are a zillion sites that are vulnerable, mainly because
> > > they parrot back to the user whatever they submitted without doing any
> > > validation or HTML/URL escaping.  Then there are browser bugs that don't
> > > treat excaped character properly.  Sigh.
> > > 
> > Whether we're talking about the IE bug, or cross-site scripting issues,
> > wouldn't the whole thing be solved by users turning *off* scripting and
> > leaving the cookies *on*?  I.e., in what ways are cookies not safe if
> > scripting is turned off?
> > 
> > What great functionality is lost if users turn off their scripting?
> > 
> > Of course, this may be an abstract question in terms of programming, if
> > users *do* insist on enabling scripting.
> > 
> > I do notice that both Microsoft and CERT, in their different ways,
> > recommend that folks turn off scripting for best protection against
> > cross-site scripting attacks:
> > 
> > http://www.cert.org/advisories/CA-2000-02.html
> > http://www.microsoft.com/technet/security/crsstQS.asp
> > 
> > So maybe some will get the message.
> > Though making ridiculous recommendations like avoiding "promiscuous
> > browsing" (CERT's words) doesn't help.
> > And MS's recommendation simply eliminates E-mail-based attacks using
> > their product (Outlook), while leaving others exposed.  They make it
> > ridiculously hard to turn off scripting, then show you how to do it only
> > in a limited way.
> > 
> > But it does seem like not even MS is saying "Don't accept cookies". 
> > Though they're still pretty quiet on the latest IE hole.
> > 
> 
> 



______________________________________________________________________
Stas Bekman             | JAm_pH    --    Just Another mod_perl Hacker
http://stason.org/      | mod_perl Guide  http://perl.apache.org/guide 
mailto:[EMAIL PROTECTED]  | http://perl.org    http://stason.org/TULARC/
http://singlesheaven.com| http://perlmonth.com http://sourcegarden.org
----------------------------------------------------------------------

Reply via email to