summaryrefslogtreecommitdiff
path: root/doc/source/features.rst
diff options
context:
space:
mode:
authorjvoisin2017-10-01 21:27:54 +0200
committerjvoisin2017-10-02 15:21:20 +0200
commitcd760451559aa2b9a8a242349fa8aefd83d4515d (patch)
tree7911a1040d01ddfde6a64730a06f8c406f6c6234 /doc/source/features.rst
parent36c06637ad262f0e5fc0c8e70f4c1fc6a565f056 (diff)
Update the documentation accordingly
Diffstat (limited to 'doc/source/features.rst')
-rw-r--r--doc/source/features.rst13
1 files changed, 6 insertions, 7 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst
index fbb2a64..c0fade3 100644
--- a/doc/source/features.rst
+++ b/doc/source/features.rst
@@ -61,17 +61,16 @@ Session-cookie stealing via XSS
61^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 61^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
62 62
63The goto payload for XSS is often to steal cookies. 63The goto payload for XSS is often to steal cookies.
64Like *Suhosin*, we are encrypting the cookies with a secret key, the IP of the user 64Like *Suhosin*, we are encrypting the cookies with a secret key,
65an environment variable (usually the IP of the user)
65and its user-agent. This means that an attacker with an XSS won't be able to use 66and its user-agent. This means that an attacker with an XSS won't be able to use
66the stolen cookie, since he (often) can't spoof the IP address of the user. 67the stolen cookie, since he can't spoof the content of the value of the environment
68variable for the user. Please do read the :ref:`documentation about this feature <cookie-encryption_config>`
69if you're planning to use it.
67 70
68This feature is roughly the same than the `Suhosin one <https://suhosin.org/stories/configuration.html#transparent-encryption-options>`_. 71This feature is roughly the same than the `Suhosin one <https://suhosin.org/stories/configuration.html#transparent-encryption-options>`_.
69 72
70Users behind the same IP address but with different browsers won't be able to use each other stolen cookies, 73Having a secret server-side key will prevent anyone (even the user himself)
71except if they can manage to guess the user agent. This isn't especially difficult,
72but an invalid decryption will leave a trace in the logs.
73
74Finally, having a secret server-side key will prevent anyone (even the user himself)
75from reading the content of the cookie, reducing the impact of an application storing sensitive data client-side. 74from reading the content of the cookie, reducing the impact of an application storing sensitive data client-side.
76 75
77The encryption is done via the `tweetnacl library <https://tweetnacl.cr.yp.to/>`_, 76The encryption is done via the `tweetnacl library <https://tweetnacl.cr.yp.to/>`_,