[662] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

RE: netscape

daemon@ATHENA.MIT.EDU (Paul Danckaert)
Mon Mar 18 05:03:20 1996

Date: Mon, 4 Mar 1996 12:41:42 -0500 (EST)
From: Paul Danckaert <pauld@umbc.edu>
To: ids@uow.edu.au
In-Reply-To: <199603011331.IAA03366@smooth.internic.net>
Reply-To: ids@uow.edu.au

On Fri, 1 Mar 1996, allwyn wrote:

> Anyone looked at the feature of Netscape's Navigator called "cookies"?

Its pretty well documented on netscape's homepage:

        http://home.netscape.com/newsref/std/cookie_spec.html

You will also see people discussing various aspects of it on netscape's 
news server, located at:

        snews://secnews.netscape.com/

Cookies are trivial to add to an existing web page.. for example, on my 
web server I have my homepage directed to a perl script which will 
generate the page at connection time.  It will send you a cookie, and if 
you have a cookie, it greets you with the last time you connected to my 
server.  (The cookie I send is simply the UNIX time..)

Cookies have limits in size and expiration time, and aren't really 
active, so I don't feel they are _too_ much of a threat.. they simply say 
you have been there before.  They can't give away more info about you 
than your browser does already (machine type, etc..).

Much nastier is JavaScript.  There are all of the various exploits for it 
already.. for example, when you look at my web page with netscape 2.0, 
your browser will send me mail automatically.  No java is involved, and 
you can't disable it.  Javascript cannot be disabled within the browser, 
though it would be interesting to write a small proxy to filter out any 
javascript in a document..   and I don't even want to get into java..

Paul Danckaert

(For the brave, or atleast people who like to mail me automatically, my test 
server is located on http://lemur.acs.umbc.edu/ )

home help back first fref pref prev next nref lref last post