Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-08 Thread Torsten Irländer
Am Donnerstag, 3. Juli 2014 15:30:09 UTC+2 schrieb Bert JW Regeer: Hello Bert, If your GET requests are not idempotent (i.e. They will always return the exact same response, and don’t modify any state) there is no cross site request forgery that can happen. I think you mean if the GET

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-08 Thread Chris Rossi
On Tue, Jul 8, 2014 at 2:27 AM, Torsten Irländer tors...@irlaender.de wrote: I think the general conclusion that GET request are not vulnerable is only true under certain circumstances. And I as a implementer do not want to think about every GET request if it might get a threat in some

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-08 Thread Torsten Irländer
Am Dienstag, 8. Juli 2014 15:23:47 UTC+2 schrieb Chris Rossi: On Tue, Jul 8, 2014 at 2:27 AM, Torsten Irländer tor...@irlaender.de javascript: wrote: I think the general conclusion that GET request are not vulnerable is only true under certain circumstances. And I as a implementer do

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-08 Thread Jonathan Vanasco
If you have expensive calculations, you can just lock them down onto a POST page under HTTPS with a CSRF token. That will eliminate most issues. You can also segment expensive routes to run in their own application instance , and throttle users (based on session, ip, etc ) so that general

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-07 Thread Torsten Irländer
Am Freitag, 4. Juli 2014 11:05:49 UTC+2 schrieb cornelius: Am 04.07.2014 10:21, schrieb Torsten Irländer: As I did not wanted to keep track on synchronizer tokens on the server side, the original web application read the session cookie from the browser and added the this token as

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-04 Thread Torsten Irländer
Am Donnerstag, 3. Juli 2014 10:48:24 UTC+2 schrieb cornelius: Am 03.07.2014 08:43, schrieb Torsten Irländer: Am Donnerstag, 3. Juli 2014 00:32:15 UTC+2 schrieb cornelius: Am 02.07.2014 23:01, schrieb Torsten Irländer: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-04 Thread Cornelius Kölbel
Am 04.07.2014 10:21, schrieb Torsten Irländer: As I did not wanted to keep track on synchronizer tokens on the server side, the original web application read the session cookie from the browser and added the this token as parameter for the further requests. Thus the server

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Torsten Irländer
Am Donnerstag, 3. Juli 2014 00:32:15 UTC+2 schrieb cornelius: Am 02.07.2014 23:01, schrieb Torsten Irländer: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer tor...@irlaender.de wrote: I guess that most people only talk

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Bert JW Regeer
On Jul 3, 2014, at 00:43 , Torsten Irländer tors...@irlaender.de wrote: Am Donnerstag, 3. Juli 2014 00:32:15 UTC+2 schrieb cornelius: Am 02.07.2014 23:01, schrieb Torsten Irländer: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Torsten Irländer
Am Donnerstag, 3. Juli 2014 01:15:41 UTC+2 schrieb Randall Leeds: On Wed, Jul 2, 2014 at 2:01 PM, Torsten Irländer tor...@irlaender.de javascript: wrote: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer tor...@irlaender.de

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Bert JW Regeer
On Jul 3, 2014, at 00:57 , Torsten Irländer tors...@irlaender.de wrote: Hmm... I was thinking of a simple HTML mail with some JS code which gets executed in Alice browser when opening the Mail. Is this problematic to start because the webmailer hopefully escapes and strips such malicious

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Torsten Irländer
Am Donnerstag, 3. Juli 2014 09:03:32 UTC+2 schrieb Bert JW Regeer: On Jul 3, 2014, at 00:57 , Torsten Irländer tor...@irlaender.de javascript: wrote: Hmm... I was thinking of a simple HTML mail with some JS code which gets executed in Alice browser when opening the Mail. Is this

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Cornelius Kölbel
Am 03.07.2014 08:43, schrieb Torsten Irländer: Am Donnerstag, 3. Juli 2014 00:32:15 UTC+2 schrieb cornelius: Am 02.07.2014 23:01, schrieb Torsten Irländer: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-03 Thread Bert JW Regeer
On Jul 3, 2014, at 02:48 , Cornelius Kölbel cornelius.koel...@netknights.it wrote: Am 03.07.2014 08:43, schrieb Torsten Irländer: Am Donnerstag, 3. Juli 2014 00:32:15 UTC+2 schrieb cornelius: Am 02.07.2014 23:01, schrieb Torsten Irländer: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2

[pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-02 Thread Torsten Irländer
Hi, I need to protect some of my GET requests in the application against CSRF attacks. AFAIKS many (if not all) resources writing about CSRF protection say that this is usually only need to be done for POST requests which will change data or the state of the application. However I feel the

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-02 Thread Bert JW Regeer
On Jul 2, 2014, at 7:29, Torsten Irländer tors...@irlaender.de wrote: Hi, I need to protect some of my GET requests in the application against CSRF attacks. AFAIKS many (if not all) resources writing about CSRF protection say that this is usually only need to be done for POST requests

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-02 Thread Torsten Irländer
Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer tor...@irlaender.de javascript: wrote: I need to protect some of my GET requests in the application against CSRF attacks. AFAIKS many (if not all) resources writing about CSRF

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-02 Thread Cornelius Kölbel
Am 02.07.2014 23:01, schrieb Torsten Irländer: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer tor...@irlaender.de javascript: wrote: I need to protect some of my GET requests in the application against CSRF

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-02 Thread Randall Leeds
On Wed, Jul 2, 2014 at 2:01 PM, Torsten Irländer tors...@irlaender.de wrote: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer tor...@irlaender.de wrote: I need to protect some of my GET requests in the application against CSRF

Re: [pylons-discuss] What is the best practice to protect GET request against CSRF attacks?

2014-07-02 Thread Bert JW Regeer
On Jul 2, 2014, at 15:01 , Torsten Irländer tors...@irlaender.de wrote: Am Mittwoch, 2. Juli 2014 17:00:02 UTC+2 schrieb Bert JW Regeer: On Jul 2, 2014, at 7:29, Torsten Irländer tor...@irlaender.de wrote: I need to protect some of my GET requests in the application against CSRF