[security] Open Redirector issue with checkid_immediate
Brandon Ramirez
brandon.s.ramirez at gmail.com
Sun Jun 14 21:18:25 UTC 2009
Use of the referrer header is a terrible idea. No good can come from it,
except for statistical purposes or usability purposes. Security-wise, it's
unreliable.
Here is just one example why:
http://support.microsoft.com/kb/178066
To be fair, OP's shouldn't be HTTP, but only HTTPS, but nevertheless, this
goes to show how one should not trust its presence or accuracy.
And true, a good browser *may* prevent it from being altered via scripting,
but that doesn't mean that they all do or always will. Don't trust the
client.
- Brandon
On Tue, Jun 9, 2009 at 1:45 PM, David Recordon <david at sixapart.com> wrote:
> We actually just use Google for this, via URLs like
> http://www.google.com/url?sa=D&q=http%3A%2F%2Fseleniumhq.org%2F.
>
> --David
>
>
> On Jun 8, 2009, at 10:00 PM, Allen Tom wrote:
>
> SitG Admin wrote:
>>
>>>
>>> It could also detect people who are browsing through proxies (or modified
>>> browsers) to strip the referer information for their privacy.
>>>
>>> Many organizations run proxies to strip the referrer from outgoing
>> requests because of privacy issues.
>>
>> Also, checking that the referrer's domain matches the return_to could be
>> problematic for RPs that run multiple domains, but have a centralized OpenID
>> RP service. Another problematic scenario is where the RP integrates with a
>> 3rd party to implement OpenID authentication, such as Janrain's RPX or
>> Google Friend Connect.
>>
>> Allen
>>
>> _______________________________________________
>> security mailing list
>> security at openid.net
>> http://openid.net/mailman/listinfo/security
>>
>
> _______________________________________________
> security mailing list
> security at openid.net
> http://openid.net/mailman/listinfo/security
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20090614/699f31a9/attachment.htm>
More information about the security
mailing list