Hi Kent,

> Just so I am not missing a class of attacks here: how important is CSRF
> protection for non-session applications? I have always viewed CSRF
> chiefly as an attack where you try to fool somebody who is authenticated
> (and therefore has privileges in the system) to ask the system to
> do a bad thing by doing the cross-site POST.

There is a difference between 'sessions' in general and
'django.contrib.sessions'. While I agree that CSRF has less impact if no
'session' is active (setting aside Paul's response regarding spam etc),
that doesn't mean we want to tie it to a specific implementation of
sessions i.e. django.contrib.sessions, which some people may not want to
use.

Also, there are the attacks known as 'login CSRF', which you might be
unaware of, and which are dangerous even when there is no pre-existing
session. As it happens, I believe our previous implementation that was
tied to django.contrib.sessions was not vulnerable to login CSRF if you
used the provided login functionality, but this was more an accident of
implementation, whereas the current system is by design not vulnerable
to login CSRF.

Luke

-- 
"If your parents never had children, the chances are you won't
either."

Luke Plant || http://lukeplant.me.uk/

-- 
You received this message because you are subscribed to the Google Groups 
"Django developers" group.
To post to this group, send email to django-developers@googlegroups.com.
To unsubscribe from this group, send email to 
django-developers+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-developers?hl=en.

Reply via email to