Am 31.08.2011 23:30, schrieb Lars Huttar:
His recommendation was to handle this entirely on the client
(mod_auth_cas), not on the CAS server. (The patch I referenced for the
CAS server is apparently intended to solve a different problem.)

My colleague's idea, paraphrased, is to modify mod_auth_cas to do the
following:

1) When the first unauthenticated request comes in:
- give the user a cookie with a unique id (I think this would have to be
separate from the CASTGC, but I'm not sure)
- store the content of their POST data somewhere, tied to that id.
Sound like a bad idea because storing post data would be pretty much an invite of an attack in my eyes. LimitRequestBody which is the only Apache setting to limit the size of POSTs to my knowledge is by default unlimited with the addition of the 300s default Timeout? Your idea would allow would allow a pretty easy memory exaustion attack (DoS)

In my eyes you should simply adjust your client to the cas setup and make it cas aware:

1. Do a non POST hit on the webserver (mod_auth_cas protected) and check if your cookie/login is still valid. If not do the normal login and your simple hit will arrive at the server. (doing a dir list or something simple you can think of in terms of server load)

2. Now you are sure you have a valid login/ticket. Now you transfer you POST data. If something goes wrong. GOTO 1

Just a pragmatic solution i would think. Another crazy idea could be to obtain a Proxy Ticket for your application. It's basically made for working with automated backend work of servers (webservices,imap etc.)

Regards,

Joachim



--
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to