diff options
| author | jvoisin | 2017-10-01 21:27:54 +0200 |
|---|---|---|
| committer | jvoisin | 2017-10-02 15:21:20 +0200 |
| commit | cd760451559aa2b9a8a242349fa8aefd83d4515d (patch) | |
| tree | 7911a1040d01ddfde6a64730a06f8c406f6c6234 /doc/source/features.rst | |
| parent | 36c06637ad262f0e5fc0c8e70f4c1fc6a565f056 (diff) | |
Update the documentation accordingly
Diffstat (limited to 'doc/source/features.rst')
| -rw-r--r-- | doc/source/features.rst | 13 |
1 files changed, 6 insertions, 7 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst index fbb2a64..c0fade3 100644 --- a/doc/source/features.rst +++ b/doc/source/features.rst | |||
| @@ -61,17 +61,16 @@ Session-cookie stealing via XSS | |||
| 61 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | 61 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
| 62 | 62 | ||
| 63 | The goto payload for XSS is often to steal cookies. | 63 | The goto payload for XSS is often to steal cookies. |
| 64 | Like *Suhosin*, we are encrypting the cookies with a secret key, the IP of the user | 64 | Like *Suhosin*, we are encrypting the cookies with a secret key, |
| 65 | an environment variable (usually the IP of the user) | ||
| 65 | and its user-agent. This means that an attacker with an XSS won't be able to use | 66 | and its user-agent. This means that an attacker with an XSS won't be able to use |
| 66 | the stolen cookie, since he (often) can't spoof the IP address of the user. | 67 | the stolen cookie, since he can't spoof the content of the value of the environment |
| 68 | variable for the user. Please do read the :ref:`documentation about this feature <cookie-encryption_config>` | ||
| 69 | if you're planning to use it. | ||
| 67 | 70 | ||
| 68 | This feature is roughly the same than the `Suhosin one <https://suhosin.org/stories/configuration.html#transparent-encryption-options>`_. | 71 | This feature is roughly the same than the `Suhosin one <https://suhosin.org/stories/configuration.html#transparent-encryption-options>`_. |
| 69 | 72 | ||
| 70 | Users behind the same IP address but with different browsers won't be able to use each other stolen cookies, | 73 | Having a secret server-side key will prevent anyone (even the user himself) |
| 71 | except if they can manage to guess the user agent. This isn't especially difficult, | ||
| 72 | but an invalid decryption will leave a trace in the logs. | ||
| 73 | |||
| 74 | Finally, having a secret server-side key will prevent anyone (even the user himself) | ||
| 75 | from reading the content of the cookie, reducing the impact of an application storing sensitive data client-side. | 74 | from reading the content of the cookie, reducing the impact of an application storing sensitive data client-side. |
| 76 | 75 | ||
| 77 | The encryption is done via the `tweetnacl library <https://tweetnacl.cr.yp.to/>`_, | 76 | The encryption is done via the `tweetnacl library <https://tweetnacl.cr.yp.to/>`_, |
