OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   Re: [xml-dev] Re: Cookies at XML Europe 2004 -- Call for Participation

[ Lists Home | Date Index | Thread Index ]

> What is to prevent replay attacks in the cookie scenario you describe?

I'm not sure what you mean by replay attack.  What packets (HTTP 
requests) is the adversary replaying?  If the initial login form is 
protected by SSL, than there's nothing to steal for future replay. (If 
your adversary can crack SSL/TLS, it's safe to assume they're going to 
go after bigger fish than you might be. :)

> A timeout only prevents *delayed* replay attacks.

No, a timeout limits the exposure if the credentials are stolen.  A 
cookie is essentially a session authenticator, and not the long-term 
identity authenticator.

	/r$

-- 
Rich Salz, Chief Security Architect
DataPower Technology                           http://www.datapower.com
XS40 XML Security Gateway   http://www.datapower.com/products/xs40.html
XML Security Overview  http://www.datapower.com/xmldev/xmlsecurity.html





 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS