Hi,

I'm attempting to understand the reasons why Wt is not vulnerable to
the BREACH attack, based on this recent blog post:

        
http://www.webtoolkit.eu/wt/blog/2013/08/07/security__wt_and_the_new_breach_vulnerability/comments?wtd=23bb67q3jTKptXwUPu0fPGQeyS9QVqrY

It says:

        "Since Wt never relies (solely) on cookies for session tracking,
        luckily, a Wt application is thus not vulnerable to BREACH,
        not in the context of CSRF or any other secret to be obtained
        from the web application."

So how does Wt handle session tracking?  Are the CSRF id's in the URL?
Do they change randomly?

Thanks,
- Chris


------------------------------------------------------------------------------
Introducing Performance Central, a new site from SourceForge and 
AppDynamics. Performance Central is your source for news, insights, 
analysis and resources for efficient Application Performance Management. 
Visit us today!
http://pubads.g.doubleclick.net/gampad/clk?id=48897511&iu=/4140/ostg.clktrk
_______________________________________________
witty-interest mailing list
witty-interest@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/witty-interest

Reply via email to