Norman,
Thanks for your clarification, however, comments inline...

> You check that the hash sent back is correct by (re)hashing the id, duh.

Of course the hash will be correct, the bot will simply return what it
recieved.  The point is that this does not prevent anyone from being able to
submit a form based on the id or hash or encrypted key.  A hidden field or
hash of a value in a web form does nothing for securty in this (or nearly
any other) case.  Think about how http works.

>
> Since only you have the secret part it is computationally difficult for
> others to create hashes for arbitrary ids.

Granted, but this was never mentioned as the issue.

>
> One reason to hash id's is that you don't want people / bots whatever
> spidering all your data, this can be security(weak) or load related.
>
How does this work, he has said that his app does not have logged in users.
Presumably any web client can do a GET to a relevant URL and view all of the
data in the DB. His issue is with people POSTing data to the DB based on the
form they GET.


> Another is CSRF http://www.djangoproject.com/documentation/csrf/

See my earlier comments for why this may not help in this case.

>
> A reason to not reveal primary keys is to not let competitors know how
> many records you have.
> http://www.guardian.co.uk/world/2006/jul/20/secondworldwar.tvandradio

Why not just set your sequence number to 500000 before you load data into
the db or pre-load the first record with a high PK, and keep the competition
guessing as to how many records you have:)
-richard


On 5/15/08, Norman Harman <[EMAIL PROTECTED]> wrote:
>
> Richard Dahl wrote:
> > Mike,
> > I concur with jonknee, the attribute 'hidden' on a form field simply
> > tells a browser that is following the standards not to display it.
> > The form field and all of the data within it is still sent via http.
> > Any script or proxy (i.e. webscarab) or other mechanism such as a
> > sniffer can get at the information within any http response or request
> > and view that information.  Whether or not the id is sent back as '1'
> > or '9ghieus78yurhfyjdn' is irrelevant to solving your problem because
> > a script or bot can just as easily return either.  The *accepted*
> > solution for this is CAPTCHA.
> > -richard
>
> You check that the hash sent back is correct by (re)hashing the id, duh.
>
> Since only you have the secret part it is computationally difficult for
> others to create hashes for arbitrary ids.
>
> One reason to hash id's is that you don't want people / bots whatever
> spidering all your data, this can be security(weak) or load related.
>
> Another is CSRF http://www.djangoproject.com/documentation/csrf/
>
> A reason to not reveal primary keys is to not let competitors know how
> many records you have.
> http://www.guardian.co.uk/world/2006/jul/20/secondworldwar.tvandradio
>
>
>
> --
> Norman J. Harman Jr.  512 912-5939
> Technology Solutions Group, Austin American-Statesman
>
___________________________________________________________________________
> Get out and about this spring with the Statesman! In print and online,
> the Statesman has the area's Best Bets and recreation events.
> Pick up your copy today or go to statesman.com 24/7.
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to