On Sun, 2010-04-04 at 14:06 +0300, Eddy Nigg wrote:
> On 04/04/2010 01:49 PM, Matt McCutchen:
> >> Which is simply another user input (modifiable by the user).
> >>      
> > That's irrelevant.  The Referer is an effective XSRF defense because a
> > malicious site cannot spoof a Launchpad referrer when sending a request
> > to Launchpad.
> >    
> 
> Huuu? And why not?

How would it?  What HTML / JavaScript could https://evil.com use to get
my browser to issue a malicious request to https://launchpad.net with a
referrer of https://launchpad.net ?

> Where exactly? I haven't see that this information is not subject to 
> user modification.

You are still missing the point.  The user can modify the referrer
header, sure, but the attack site that wishes to forge a cross-site
request cannot (unless the user specifically modified the browser to
allow that, which would be foolish).

-- 
Matt

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to