Re: [http-state] Security considerations overview
Adam Barth <ietf@adambarth.com> Tue, 02 March 2010 20:05 UTC
Return-Path: <ietf@adambarth.com>
X-Original-To: http-state@core3.amsl.com
Delivered-To: http-state@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AE0F33A8C8A for <http-state@core3.amsl.com>; Tue, 2 Mar 2010 12:05:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LK64lBCDueAv for <http-state@core3.amsl.com>; Tue, 2 Mar 2010 12:05:28 -0800 (PST)
Received: from mail-qy0-f195.google.com (mail-qy0-f195.google.com [209.85.221.195]) by core3.amsl.com (Postfix) with ESMTP id A2E4B3A8C89 for <http-state@ietf.org>; Tue, 2 Mar 2010 12:05:28 -0800 (PST)
Received: by qyk33 with SMTP id 33so375750qyk.17 for <http-state@ietf.org>; Tue, 02 Mar 2010 12:05:27 -0800 (PST)
Received: by 10.224.23.145 with SMTP id r17mr84863qab.119.1267560326869; Tue, 02 Mar 2010 12:05:26 -0800 (PST)
Received: from mail-iw0-f179.google.com (mail-iw0-f179.google.com [209.85.223.179]) by mx.google.com with ESMTPS id 20sm4407382iwn.5.2010.03.02.12.05.25 (version=SSLv3 cipher=RC4-MD5); Tue, 02 Mar 2010 12:05:25 -0800 (PST)
Received: by iwn9 with SMTP id 9so649449iwn.17 for <http-state@ietf.org>; Tue, 02 Mar 2010 12:05:25 -0800 (PST)
MIME-Version: 1.0
Received: by 10.231.145.70 with SMTP id c6mr205230ibv.36.1267560325159; Tue, 02 Mar 2010 12:05:25 -0800 (PST)
In-Reply-To: <Pine.LNX.4.64.1003021139330.4097@egate.xpasc.com>
References: <5c4444771003021103s422a65c3me96af57dfee58105@mail.gmail.com> <Pine.LNX.4.64.1003021139330.4097@egate.xpasc.com>
From: Adam Barth <ietf@adambarth.com>
Date: Tue, 02 Mar 2010 12:05:05 -0800
Message-ID: <5c4444771003021205t78c18f73t78913ae6ff3c70b1@mail.gmail.com>
To: http-state <http-state@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: Re: [http-state] Security considerations overview
X-BeenThere: http-state@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discuss HTTP State Management Mechanism <http-state.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/http-state>, <mailto:http-state-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-state>
List-Post: <mailto:http-state@ietf.org>
List-Help: <mailto:http-state-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-state>, <mailto:http-state-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Mar 2010 20:05:29 -0000
On Tue, Mar 2, 2010 at 11:42 AM, David Morris <dwm@xpasc.com> wrote: > On Tue, 2 Mar 2010, Adam Barth wrote: >> <t>Transport-layer encryption, such as HTTPS, is insufficient to >> prevent a network attacker from altering a victim's cookies because >> the cookie protocol does not provide integrity. By default, cookies >> are transmitted in the clear, where their confidentiality can be >> compromised by a network attacker.</t> > > I don't under stand how the second sentence extends the thought in the > first sentence. It seems in conflict in the sense that HTTPS is not > sending cookies in the clear and use of HTTPS is generally recommended > as the way to avoid compromise by network hackers. What am I missing? If even if you use the cookie protocol exclusively over HTTPS, the default is still to send the cookies in the clear (i.e., the secure-only-flag defaults to false). Adam
- [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview David Morris
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview David Morris
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview Tyler Close
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview David Morris
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview David Morris
- Re: [http-state] Security considerations overview Maciej Stachowiak
- Re: [http-state] Security considerations overview Maciej Stachowiak
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview =JeffH
- Re: [http-state] Security considerations overview Tyler Close
- Re: [http-state] Security considerations overview Achim Hoffmann
- Re: [http-state] Security considerations overview Achim Hoffmann
- Re: [http-state] Security considerations overview Mark Pauley
- Re: [http-state] Security considerations overview Mark Pauley
- Re: [http-state] Security considerations overview Dan Witte
- Re: [http-state] Security considerations overview Achim Hoffmann
- Re: [http-state] Security considerations overview Adam Barth
- Re: [http-state] Security considerations overview Mark Pauley
- Re: [http-state] Security considerations overview David Morris
- Re: [http-state] Security considerations overview Adam Barth