[150322] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS Attacks

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Tue Feb 21 17:29:57 2012

In-Reply-To: <CAMhuimisRngM_0si_fdWRhcxA-YOMASyzi4XHm-zOE-_uM0+2Q@mail.gmail.com>
Date: Tue, 21 Feb 2012 16:29:04 -0600
From: Jimmy Hess <mysidia@gmail.com>
To: Ken Gilmour <ken.gilmour@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, Feb 19, 2012 at 4:59 AM, Ken Gilmour <ken.gilmour@gmail.com> wrote:
> What happens when the client sends a POST from a cached page on the end
> user's machine? E.g. if they post login credentials. Of course, they'll get
> the error page, but then you have confidential data in your logs and now
> you have to protect highly confidential info, at least if you're in europe.

Either you don't log the data on the webserver,  or you notify the
user that the POST form data has now been posted, and display the link
to the public web page where their posted data now appears, on the
error page.

Once your user has shared "confidential" information unsolicited with
an unknown third party, and the general public,   the information's
confidentiality was spoiled by the act of posting, regardless of the
content of the information

-- 
-JH


home help back first fref pref prev next nref lref last post