Uploaded image for project: 'Wave'
  1. Wave
  2. WAVE-134

Security: XSRF Protection

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Open
    • Minor
    • Resolution: Unresolved
    • None
    • None
    • Server

    Description

      We should not use the default JSESSIONID from jetty and we are not doing any verification of the token. For XSRF protection, we should create a token like the following

      token = base64( (hmac( user_id + DELIMITER + action + DELIMITER + time, secret) + DELIMITER + time );

      token is thus bound to a specific user and action/URL. XSRF token should be included in all state-changing requests and verified on the server-side.


      Issue imported from http://code.google.com/p/wave-protocol/issues/detail?id=133

      Owner: so...@google.com
      Label: Type-Defect
      Label: Priority-Medium
      Stars: 1
      State: open
      Status: Accepted

      Attachments

        Activity

          People

            Unassigned Unassigned
            Anonymous Anonymous
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated: