[159748] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Suggestions for the future on your web site: (was cookies, and

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Sat Jan 19 19:33:50 2013

In-Reply-To: <20130119034531.GF31028@hezmatt.org>
Date: Sat, 19 Jan 2013 18:33:33 -0600
From: Jimmy Hess <mysidia@gmail.com>
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 1/18/13, Matt Palmer <mpalmer@hezmatt.org> wrote:
> Primarily abuse prevention.  If I can get a few thousand people to do
> something resource-heavy (or otherwise abusive, such as send an e-mail
> somewhere) within a short period of time, I can conscript a whole army of
> unwitting accomplices into my dastardly plan.  It isn't hard to drop

You can prevent this without cookies.  Include a canary value in the
form;  either a nonce stored on the server,  or a  hash of a secret
key, timestamp, form ID, URL, and the client's IP address.

If the form is submitted without the correct POST value,  if their IP
address changed,  or after too many seconds since the timestamp,
then redisplay the form to the user,  with a request for them to
visually inspect and confirm the submission.



> exploit code on a few hundred pre-scouted vulnerable sites for drive-by

> - Matt
--
-JH


home help back first fref pref prev next nref lref last post