> -----Original Message-----
> From: Dave Watts [mailto:[EMAIL PROTECTED]
> Sent: Thursday, July 28, 2005 11:45 AM
> To: CF-Talk
> Subject: RE: Security of GET vs. POST via HTTPS?
> 
> > We've got a 3rd party API that we call via HTTPS. They want the
> > data submitted via GET (i.e. URL strings) whereas its my
> > understanding that POST would be more secure. Am I correct in
> > my understanding or loosing my mind?
> 
> You are incorrect, but I doubt you're losing your mind. When you make an
> HTTPS request, the entire request (including the URL you're requesting) is
> encrypted. So, they are equally secure. For that matter, they're equally
> secure within plain old HTTP - both are perfectly readable plaintext.
> However, variables within a URL are easily observed by the user of a
> browser, so in that sense they are more likely to be tinkered with by the
> user.

Also, when used in a browser, they are normally bookmarked with the page.

This now extends security requirements to machine containing the bookmarks
as well as the user.

What this comes down to is the boundaries of security.  SSL (HTTPS) is
bounded by the user agent (browser) and the server (or security appliance).
It protects only the contents of requests between these two points.

The encrypted data isn't protected at all (it's flying across public lines
in most cases).  The network information isn't protected (somebody could
snoop the lines and discover the IP addresses and possibly locations of both
machines involved).

Only the actual data stream is protected.  In this sense, considering just
HTTP and HTTPS there's, no difference between POST and GET.

However when you look at the ends (set boundaries for the entire
application) you can see some potential issues.  Again the GET information
is part of the URL so anything that logs, captures, or saves URL information
(like bookmarking) will also log, capture or save that information.

It's just as easy to do the same for POST data, but it's less common.

The server-side has similar issues.  Most servers will log URL query
strings, but don't automatically log POST variables (again however, they
could easily do both).

So while the transmission is secure with SSL are the log files secure?  Are
the machines secure?

You can't extend your boundaries forever but you should know where they get
fuzzy at least.  ;^) I find it's a useful mental exercise to role-play this
kind of stuff and explore outside the boundaries of the set security... are
people going to bookmark your pages?  Might they use public terminals?  Will
they always use browsers with SSL?  JavaScript?  Cookies?

Jim Davis




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:213211
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to