Hi All,

First, the important question: If I use http://docs.pylonsproject.org/projects/pyramid/1.0/narr/sessions.html#using-the-default-session-factory is the CSRF protection provided by http://docs.pylonsproject.org/projects/pyramid/1.0/narr/sessions.html#preventing-cross-site-request-forgery-attacks still secure and effective?

The less important question: which tracker should I use for documentation feature requests?

It sounds like http://docs.pylonsproject.org/projects/pyramid/1.0/narr/sessions.html#preventing-cross-site-request-forgery-attacks is important, but without a worked example of the dangerous use case, and that same example shown with session.get_csrf_token saving the day, I struggle to follow it.

Ideally, I guess I'd like an example with a template and a view, showing what could happen and the workflow of usinging the CSRF protection stuff...

cheers,

Chris

--
Simplistix - Content Management, Batch Processing & Python Consulting
           - http://www.simplistix.co.uk

--
You received this message because you are subscribed to the Google Groups 
"pylons-devel" group.
To post to this group, send email to pylons-devel@googlegroups.com.
To unsubscribe from this group, send email to 
pylons-devel+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/pylons-devel?hl=en.

Reply via email to