* Ted Lemon:

> It's kind of assumed that you would be aware of these issues, I guess.

But hardly anybody seems to be.

> Lots of web sites use cookies to associate a session with a
> particular user.   With cross-site cookie theft, a malicious web site
> can gain access to your session cookie even if it was protected by
> https encryption when you were talking to the legitimate site.

Yes, but that's why cookies are associated with the host name of the
incoming request.  The cookie set operation controls which domains can
read the cookie.  No special data is required for that.

What's happening here is that a restriction is placed on the largest
possible subtree for which you can set a cookie.  Failure to do this
does not grant read access to arbitrary cookies in itself.  But as I
wrote, it might expose session fixation problems.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to