[13770] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Evil Cookies.

daemon@ATHENA.MIT.EDU (Tim Adam)
Wed Feb 9 03:54:37 2000

Content-Type: text/plain
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-Id:  <00020910555001.20675@brock>
Date:         Wed, 9 Feb 2000 10:11:40 +1100
Reply-To: Tim Adam <tma@OSA.COM.AU>
From: Tim Adam <tma@OSA.COM.AU>
X-To:         Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Dylan Griffiths wrote:
> Thomas Reinke wrote:
> > There is no easy patch to this problem. The only solution I
> > can think of, which is not an easy one, would be to have browsers
> > have intimate knowledge of what constitutes an organization's
> > "domain of influence", and limit cookies accordingly. This
> > is essentially impossible to implement.
>
> > (Consider  domain.city.state.country - where is the allowable
> > domain of influence here? Probably 4 levels deep, but how
> > to indicate this to the browser).
>
> Perhaps this would be an exercise best left up to the user, as there is
> currently no way to indicate the scope of the authority (harmless TLD,
> country, normal domain, etc) in the DNS system.

A similar problem existed in WPAD (Web Proxy Auto-Discovery)
for IE 5.0: see MS Security Bulletin MS99-054 at
http://www.microsoft.com/technet/security/bulletin/ms99-054.asp

The browser was walking up the DNS hierarchy looking for the name wpad,
in some cases making queries outside the organization's trust boundary.

Tim.
--
Tim Adam  Tim.Adam@osa.com.au     http://www.osa.com
Software Development Engineer   Phone: +61 3 9895 2199
Open Software Associates Ltd.   Box Hill VIC Australia
 Proven Solution Deployment for the Global Enterprise

home help back first fref pref prev next nref lref last post