That was my initial reaction, too.  In a closed system, it makes sense -- for 
the public notebook, it doesn't immediately seem like such a bad thing, but it 
lends to a scary attack.

Robert makes an account on the public notebook.
Robert sees William's account on the failure page, so creates an account -- 
then from the notebook, Robert launches a zero-latency brute-force attack to 
discover William's password.
Now, Robert logs into William's account.  From there, he inserts malicious 
javascript into William's most-recently edited worksheet.
Next time William opens his favorite worksheet, Robert pwns his machine, logs 
in, and edits the grade chart for William's Math 581 class, scoring himself a 
well-deserved 4.1...



On Thu, 20 Dec 2007, Robert Miller wrote:

>
> As pointed out by Michael Abshoff, it seems like an information leak
> to list all the usernames on a notebook when you fail to use a valid
> one to log in. Thoughts?
> >
>



--~--~---------~--~----~------------~-------~--~----~
To post to this group, send email to sage-devel@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/sage-devel
URLs: http://sage.scipy.org/sage/ and http://modular.math.washington.edu/sage/
-~----------~----~----~----~------~----~------~--~---

Reply via email to