On Aug 6, 2013, at 12:16 PM, Tom Scrace <t.scr...@gmail.com> wrote:

> On Tuesday, August 6, 2013 3:42:01 PM UTC+1, Jacob Kaplan-Moss wrote:
> 
> We plan to take steps to address BREACH in Django itself, but in the meantime 
> we recommend that all users of Django understand this vulnerability and take 
> action if appropriate.
> 
> 
> Would randomizing the CSRF token on each request be the correct way to fix 
> this in Django?

This incurs the cost that every request to Django invalidates all existing CSRF 
tokens (meaning if you start filling out a form, and then open another form in 
a different tab the first form will send an error) OR requires you to store a 
separate CSRF token for each request and look up the submitted CSRF token in 
that set of stored tokens.

There are a few possible solutions each with their own drawbacks. Such as 
secret hiding or disabling compression only for pages that have CSRF (or other 
secret output).

> 
> Tom 
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "Django developers" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to django-developers+unsubscr...@googlegroups.com.
> To post to this group, send email to django-developers@googlegroups.com.
> Visit this group at http://groups.google.com/group/django-developers.
> For more options, visit https://groups.google.com/groups/opt_out.
>  
>  


-----------------
Donald Stufft
PGP: 0x6E3CBCE93372DCFA // 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to