adoption and deployment at large likely hinges on the browser supporting it
-
-
Replying to @__b_c @RichFelker
But you dodged Rich's main point, it has to be an attack that can't just be exploited using the same vector you used to get the cookie, right? Subdomain takeover is the first example I've heard that works, but that's pretty niche, you have to admit?
4 replies 0 retweets 2 likes -
Replying to @taviso @RichFelker
didn't mean to dodge so much as try to diplomatically say that I agree that there some limitations to the value prop around the browser/cookie protections but that there are other use cases, like SSO and native OAuth/API, that can benefit
1 reply 0 retweets 1 like -
and that even when there are other attack vectors, I believe there's still value in enabling a cookie to be bound to a client generated asymmetric key because it does prevent the cookie from being used successfully in a different context without also getting the key
1 reply 0 retweets 1 like -
Replying to @__b_c @RichFelker
Sure, it can (depending on if backed by hardware) prevent cookie from being used on another machine...but what attack are you imagining that can't be executed from the compromised machine instead? This is my main sticking point.
2 replies 0 retweets 2 likes -
Replying to @taviso @RichFelker
stealing cookie from a workstation left unlocked for a couple minutes while someone gets coffee
2 replies 0 retweets 0 likes -
Replying to @__b_c @RichFelker
Why wouldn't you just install malware? Then you can use the cookie as much as you like. I really feel like there is no good answer to this. The httponly comparison is the best argument I've heard, and it's not super convincing.
1 reply 0 retweets 1 like -
Replying to @taviso @RichFelker
to me installing malware is a higher bar than stealing a cookie. more premeditated than opportunistic. but maybe that's naive
1 reply 0 retweets 0 likes -
Replying to @__b_c @RichFelker
Why couldn't i just download meterpreter or whatever, run it and walk away? That kinda seems easier than "steal cookies", what's the process you're thinking of that doesn't require any code? Login to dropbox, navigate to %USERPROFILE%, upload cookies.db?
1 reply 0 retweets 1 like -
Replying to @taviso @RichFelker
i'm thinking of just viewing the cookie in the browser prefs
1 reply 0 retweets 0 likes
And memorizing it...? You have to save it somewhere, otherwise you're stuck transcribing it so you can use it - that's a lot of work. Is your argument that attacker will say "darn, token binding, I'll give up" instead of slightly different attack with same impact?
-
-
Replying to @taviso @RichFelker
only that it wouldn't work when they attempted to use it later
1 reply 0 retweets 0 likes -
Replying to @__b_c @RichFelker
I think I understand all the arguments now, I think Token Binding is a solution looking for a problem! Hopefully you can see why someone might feel that way
2 replies 0 retweets 4 likes - 2 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.