Re: consensus on :query ?

Like so: http://en.wikipedia.org/wiki/CRIME
-=R

On Mon, Jul 21, 2014 at 10:40 PM, Poul-Henning Kamp <phk@phk.freebsd.dk>
wrote:

> In message <CAP+FsNcaxeEhEpQCAteQUZGn03OXTv=
> MR8xz9nLZVDSU9nf8iA@mail.gmail.com>
> , Roberto Peon writes:
>
> >If the path contains:
> >/foo/RANDOM_NUMBER/bar
> >
> >and the query contains:
> >q=foo&user=SOME_SECRET_ID
> >
> >Then guessing:
> >/foo/RANDOM_NUMBER/bar?q=foo&user=SOME_SECRET_ID
> >
> >is far, far FAR more difficult than guessing:
> >  q=foo&user=SOME_SECRET_ID
> >alone or
> >  /foo/RANDOM_NUMBER/bar
> >alone.
>
> Only if you have an oracle to tell you that you got a hit.
>
> Could you outline exactly how this attack would work ?
>
> --
> Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
> phk@FreeBSD.ORG         | TCP/IP since RFC 956
> FreeBSD committer       | BSD since 4.3-tahoe
> Never attribute to malice what can adequately be explained by incompetence.
>

Received on Tuesday, 22 July 2014 06:08:48 UTC