[ 
https://issues.apache.org/jira/browse/MODPYTHON-254?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Grisha Trubetskoy updated MODPYTHON-254:
----------------------------------------

    Component/s:     (was: session)
                 core
    Description: Cookies should generate a random salt when signing so that 
cookies are not vulnerable to dictionary attacks. Also cookies use default 
hmac, which in turn defaults to MD5 signatures. We should probably move on to 
SHA given how weak MD5 has been shown to be.  (was: Sessions should generate a 
random salt when signing so that cookies are not vulnerable to dictionary 
attacks. In general storage of any data in signed cookies should be discouraged 
in favor of storing the session locally and only passing on a session id to the 
browser. Also sessions use default hmac, which in turn defaults to MD5 
signatures. We should probably move on to SHA given how weak MD5 has been shown 
to be.)
        Summary: Signed Cookies should use a salt and not rely on md5.  (was: 
Signed Sessions should use a salt and not rely on md5.)

> Signed Cookies should use a salt and not rely on md5.
> -----------------------------------------------------
>
>                 Key: MODPYTHON-254
>                 URL: https://issues.apache.org/jira/browse/MODPYTHON-254
>             Project: mod_python
>          Issue Type: Bug
>          Components: core
>    Affects Versions: 3.3.1
>            Reporter: Grisha Trubetskoy
>
> Cookies should generate a random salt when signing so that cookies are not 
> vulnerable to dictionary attacks. Also cookies use default hmac, which in 
> turn defaults to MD5 signatures. We should probably move on to SHA given how 
> weak MD5 has been shown to be.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to