On Wed, 2010-09-08 at 10:22 +0200, Patryk Zawadzki wrote:

> Again, it's not there to counter attacks. Think of it as the
> equivalent of the "csrftoken" cookie which could be read in the exact
> same way. I just wanted a couple of strings that are not likely to
> change between form generation and submission.

The csrftoken cookie *cannot* be read in this situation by an attacker,
since it is a cookie and will *not* be sent to the third party site, so
they cannot create a form with a csrftoken which matches the user's
cookie. (We are not talking about a MitM attack here, just a standard
third party site that your browse to).

Luke

-- 
 A mosquito cried out in pain:
 "A chemist has poisoned my brain!"
 The cause of his sorrow
 was para-dichloro-
 diphenyltrichloroethane

Luke Plant || http://lukeplant.me.uk/

-- 
You received this message because you are subscribed to the Google Groups 
"Django developers" group.
To post to this group, send email to django-develop...@googlegroups.com.
To unsubscribe from this group, send email to 
django-developers+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-developers?hl=en.

Reply via email to