On Jan 8, 2007, at 2:23 PM, Paul Johnston wrote:

Hi,

I don't know for sure, but I believe it's a HMAC. For ASP.NET it seems the HMAC key is a per-server secret (with hooks for syncronising this in a cluster). I actually think that is a weakness and a per-session key would be preferable.

So... would encrypting the contents of the state hidden fields securely (probably using sessions or something to store per-session secrets) make them safely unpickable? This is something that I might implement in toscawidgets... it already uses middleware to serve static files and registering the "framework" object into a multiple- app-per-process-safe module-global so I guess it wouldn't be too hard to make it send a widget_cookie or something to handle this kind of state passing...


Another thing to consider is cross-site request forgeries (CSRF). Ideally the widgets forms would come with built-in protection.

There was a ticket at the Trac for that: http://trac.turbogears.org/ ticket/547

At some point I am hoping to do a security audit of TG. Right now though, I have other priorities, namely getting my app working! :-)

A security audit would be something we'll all appreciate much! :)

Alberto
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"TurboGears" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/turbogears?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to