[2501] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: cookie overloading (denial of service)

daemon@ATHENA.MIT.EDU (Gene Ingram)
Mon Jul 22 21:52:37 1996

Date: Mon, 22 Jul 1996 15:46:24 -0700
From: Gene Ingram <gene@hpfsvr01.cup.hp.com>
Reply-To: www-security@ns2.rutgers.edu
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

> With your browser limited to holding 300 cookies, I've pretty much
> forced your browser to discard most or all of the previous cookies
> in favor of mine.

Netscape's going to have to increase their 300 cookie ceiling in 
its next release to accommodate increased demand.  :-)  Is 
memory limitation the reason for limit?  Maybe they should have a 
field to define the cookie limit, something like this:

Memory cache:  3000  Kilobytes
  Disk cache:  5000  Kilobytes
Cookie cache:  3000  Kilobytes

Then if you set Cookie cache to ZERO it will solve the problem.

-- 
___
 | ._  _ ._ _.._ _    ``I do not fear computers
_|_| |(_|| (_|| | |     I fear lack of them.''  -Isaac Asimov
_____  _|  _______________________________________________________
Key fingerprint:  93 E1 15 E6 35 BC B2 84  B2 7B 39 76 29 72 32 72
 [Signature lettering created by ``Figlet Ascii Font Converter''
  http://mediacube.datacom.de/cgi-bin/moniteurs/figlet]

home help back first fref pref prev next nref lref last post