[23110] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft IE cookies readable via about: URLS

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Nov 12 16:27:31 2001

Message-Id: <200111121814.fACIEjMb019224@foo-bar-baz.cc.vt.edu>
To: Oliver Petruzel <opetruzel@cox.rr.com>
Cc: bugtraq@securityfocus.com
In-Reply-To: Your message of "Fri, 09 Nov 2001 21:20:29 EST."
             <000701c1698e$44cf66c0$8800a8c0@cox.rr.com> 
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-617991236P";
	 micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Mon, 12 Nov 2001 13:14:44 -0500

--==_Exmh_-617991236P
Content-Type: text/plain; charset=us-ascii

On Fri, 09 Nov 2001 21:20:29 EST, Oliver Petruzel <opetruzel@cox.rr.com>  said:
> This brings to mind a question:  has anyone collected a list of the most
> revealing KNOWN cookies in the wild?  Is there a resource (site)
> available with a list for me to use in order to perhaps blacklist the
> URL's personally?  I often find myself studying my local cookies and
> have noticed repeat offenders from very popular sites that I avoid now
> because of this; and I believe such a public list would serve as a way
> to prevent cookies from becoming too powerful or revealing.  A cookie
> reporting service possibly.  Anyone with a link for this if it already
> exists or with the energy to compile it yourself, go for it, and plz let
> us know.

A far better approach is to use software that blocks *all* cookies, and
then have an exemption list for those sites that *YOU* visit that specifically
need cookies in order to function.

Remember - cookies as data harvesting tools only work because a large
percentage of people allow cookies.  If the *default* behavior of people
was to tolerate only cookies that allow (for instance) session management
of a single visit, or only retain very basic cross-session information,
then the site operators wouldn't have much reason to use cookies.

Something that's a *bigger* issue is probably the infamous "web bug", which
usually shows up as a 1x1 transparent pixel.  Now *THERE* is a area where
a "black list" might be more useful (because you can have an <IMG> tag
that points off-site to a tracking service, where the user may have
said "only allow cookies from this server").

There's Unix software for all this at www.junkbuster.com.  I have *NOT*
tried their Windows software.  It's not a *total* solution, but it's
a start.
-- 
				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech



--==_Exmh_-617991236P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.5 07/13/2001

iQA/AwUBO/ARlHAt5Vm009ewEQJLKgCgn/JqpbJNxVvgm+1+JcfO6hYK/5AAoOdQ
CS67ZvYU6iHOC7AjGWeDdTBp
=9MA4
-----END PGP SIGNATURE-----

--==_Exmh_-617991236P--

home help back first fref pref prev next nref lref last post