Hey Chris,

2013/8/19 Chris Frey <cdf...@foursquare.net>:
> On Mon, Aug 19, 2013 at 09:57:14PM +0200, Koen Deforche wrote:
>> Since we do not rely on cookies, there is no need for CSRF tokens. The
>> BREACH attack doesn't really mention very well, IMHO, that it relies
>> on cookies for session tracking in the first place since that's the
>> starting point to trying to guess a secret in the page by generating
>> requests from the user's browser.
>
> Thanks very much for your reply!
>
> Yes, that makes more sense.  If I understand correctly, the entire attack
> relies on:
>
>         - the CSRF is given to the server via cookie automatically

CSRF = Cross Site Request Forgery; that's already an attack.

CSRF attacks a target site from the user's browser (that is also
visiting the attacker's site) by abusing the cookie that is used to
trust requests from the browser and thus generate malicious requests
from within the user's browser to the site under attack.

The CSRF token is the primary defense for this attack since it puts a
token in the response that must be included in "sensitive" requests in
the form submitted from client to server (i.e. requests that modify
data, POST), however GET requests are usually not protected and
provide this CSRF token in their body.

This, together with user-modifiable output in the response of the GET
request, is the basis for BREACH, or at least in the scenario that
they are after your CSRF token. But they can also attempt to obtain
other interesting information such as name, bank account number, etc
which is in the GET body.

> In Wt's case, there is generally no cookie value at all, and if the
> attacker guesses a different ID via URL, then it just starts a new
> session and that new ID comes back in the HTML.
>
> Is that close?

That's close. It's even the case that Wt will ignore the session ID
(or refuse the request, I forget now what we actually do) if you would
put it in a URL for a page refresh. This is a second defense in Wt to
make a stolen session ID even useless. Again this all under the
assumption of an Ajax session.

Regards,
koen

------------------------------------------------------------------------------
Introducing Performance Central, a new site from SourceForge and 
AppDynamics. Performance Central is your source for news, insights, 
analysis and resources for efficient Application Performance Management. 
Visit us today!
http://pubads.g.doubleclick.net/gampad/clk?id=48897511&iu=/4140/ostg.clktrk
_______________________________________________
witty-interest mailing list
witty-interest@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/witty-interest

Reply via email to