On 07/11/2013 03:37 PM, Yoav Nir wrote:

> I would still be able to make a form that would cause a POST. It's just a 
> matter of getting the user to click a button, no?  I think I could also do it 
> in Javascript.

Which is why you need CSRF protection, as i mentioned.
> 
> They don't have to. I don't think they wrote the web server from scratch. 
> They have probably some web server and/or framework that does the cookie and 
> authentication handling for them. CSRF counter-measures are hard. Writing the 
> application with POST rather than GET is not hard, but it's something you 
> have to think about. New-fangled cookies can be baked into the framework.

Any sane modern webapp framework has CSRF protection built in already.
Some not-so-sane and not-so-modern webapp frameworks have it too :P  The
point is, the devs on this silly appliance you describe weren't using
such a framework.

> I think anything that takes the requirement for security clue away from the 
> web developer and into the hands of the framework developer is a good thing. 
> That does not mean they won't find other ways to mess up, but this is one 
> case we can fix.

Sure, they could also have fixed it using standard tools that we already
have available, though, without any new standards.

I'm not saying that there are no good arguments for working on the
session continuation problem as stated; i'm just saying that this
example does not seem like a clear argument for it.

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
websec mailing list
websec@ietf.org
https://www.ietf.org/mailman/listinfo/websec

Reply via email to