> STEP 2:
> User A: logins in and is redirected to
> CAS.http://example.service.com?ticket=newTicket1
> CAS set cookie
> STEP 3:
> User A throws ticket away. and returns to service, automated!

Just to clarify, you mean throws the service ticket away while
preserving the CASTGC cookie containing the TGT.  (Discarding the TGT
would require reauthentication to obtain any new tickets, and
therefore not be automated.)

You've outlined an interesting possibility for a denial of service
attack against CAS through resource consumption of service ticket
storage, but I believe such an attack could be largely mitigated by
both reducing the service ticket expiration period and configuring the
RegistryCleaner component to run more frequently to purge expired
tickets and reclaim storage space.  I think if you could provide a
proof-of-concept for a denial of service condition, solutions
including one similar to what you proposed might be considered for
CAS4.

M

-- 
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to