-
-
Notifications
You must be signed in to change notification settings - Fork 9.6k
[Security] Randomize CSRF token to harden BREACH attacks #39919
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
(failure is related) |
e24c286
to
cb16125
Compare
last failed test is about tests in branch < Once this PR merge, I've to fix the test in downstream branches |
src/Symfony/Bundle/SecurityBundle/Tests/Functional/CsrfFormLoginTest.php
Outdated
Show resolved
Hide resolved
This PR was merged into the 4.4 branch. Discussion ---------- [SecurityBundle] Remove wrong test | Q | A | ------------- | --- | Branch? | 4.4 | Bug fix? | yes | New feature? | no | Deprecations? | no | Tickets | - | License | MIT | Doc PR | - This tests, asserts that all links to logout are identical, which is wrong and incompatible with BREACH mitigation #39919 Commits ------- 91c360e Remove wrong test
green \o/ |
Thank you @jderusse. |
Hi Team, sorry to add a post-merge comment but I am learning and curious about the implementation choice used in this PR. |
BREACH attack is all about guessing There is nothing secret here (as an evidence: the KEY used to XOR is included in the payload). |
To be clear, this PR does not even implement encryption at all (so there is no question about whether the encryption is secure or no) |
Cool, thanks for the explainations! |
This PR randomize the CSRF token in each request in order to hardening the BREACH attack