Like so: http://en.wikipedia.org/wiki/CRIME
-=R
On Mon, Jul 21, 2014 at 10:40 PM, Poul-Henning Kamp <phk@phk.freebsd.dk>
wrote:
> In message <CAP+FsNcaxeEhEpQCAteQUZGn03OXTv=
> MR8xz9nLZVDSU9nf8iA@mail.gmail.com>
> , Roberto Peon writes:
>
> >If the path contains:
> >/foo/RANDOM_NUMBER/bar
> >
> >and the query contains:
> >q=foo&user=SOME_SECRET_ID
> >
> >Then guessing:
> >/foo/RANDOM_NUMBER/bar?q=foo&user=SOME_SECRET_ID
> >
> >is far, far FAR more difficult than guessing:
> > q=foo&user=SOME_SECRET_ID
> >alone or
> > /foo/RANDOM_NUMBER/bar
> >alone.
>
> Only if you have an oracle to tell you that you got a hit.
>
> Could you outline exactly how this attack would work ?
>
> --
> Poul-Henning Kamp | UNIX since Zilog Zeus 3.20
> phk@FreeBSD.ORG | TCP/IP since RFC 956
> FreeBSD committer | BSD since 4.3-tahoe
> Never attribute to malice what can adequately be explained by incompetence.
>