Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <524E5B06.2030500@redhat.com>
Date: Fri, 04 Oct 2013 00:07:02 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Donald Stufft <donald@...fft.io>
CC: oss-security@...ts.openwall.com
Subject: Re: A note on cookie based sessions

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/03/2013 11:26 PM, Donald Stufft wrote:
> I don't think this really is a vulnerability is it? I mean it's
> basically how the internet works. The only difference between a
> cooke backed session and a regular session is that there's no
> server side session to destroy. At least in Django's case, It's not
> a permanent session though, they are only good for a limited amount
> of time before the signature on the cookie expires.
> 
> If you have access to the session cookie you've already won the
> game, you've gotten an XSS or MITM and can do much worse then a
> session cookie.
> 

Apologies I should have been more explicit. The difference is that
with a stateful backend when the user  hits log out they are logged
out in the back end, so the cookie can't be used any more. With these
stateless solutions there is no way to prevent cookie reply other than
encoding a time out in the cookie (so I guess you could encode like a
short time out and keep rotating the cookie to close the window of
opportunity).

The concern is people using public terminals, cookie stealing attacks,
XSS in the website you're using, etc allowing an attacker to snag your
cookie and use it post "log out".


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQIcBAEBAgAGBQJSTlsGAAoJEBYNRVNeJnmTTowQALWeB44M2xq1l6XZPYxfzoS3
EqRmHP2FT0ZrZH5wSiq4gTzecyke/nIf7JnrrcdNeirPPAl+NNqPS6TaOeguL20g
SS5oqpC2rsEu1XveZC6M8YenqaPn8UQ04PYH8dCkyIholUKrh+bET5sTa5N90s33
wzYE80vAh9jdS9BH93iye+eFMzF+wfrEtgRsIg4kmD0Rt4L0f1KUkLoAQcdPq8tN
0Md4RocD0dQibKZ3j54ToxB7NxiEThYztf9pQLrJUYjuo9lIlIk9JCDkjQfGaIuR
CgpB5LgX9eYnIgi+yI9DmPJHLNkwJE2dGWZPGaFnzmuw5cUKyLL5IEzOpRRgGraR
b90lEP1R4/WAAfOWGyQ9eOoPQDm5WMfvjpfGw/djpuIPRAywAo3X+HnQwTVhHD8y
kfuoYLQn+ymse9WEZPzKEOvW+AhSx/7LQ3vc+RNLr043zSaCzcaBWX8C3GhYAH+E
ACwipVV0LQHto3KY8Oi86/nj7IvLU5uevpzdfSiUnRI1seGgj964Ka4nGcRL5tuw
ZGsAj+h+vsiWFm2n9HS0OanKE+XU5XgMxzoC3HTrU0QZyIH0s8hebR8HzB8BVFW9
4uwvni/8AbhPY3ZUnNH2+/OTZvHm5V9O3frobA/c6eOOTG85JHpMnUR+pgur4rqV
WsBNRKn596piipDwn1AS
=Tqge
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.