Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use time-constant comparison for CSRF tokens in endpoint #10157

Merged
merged 1 commit into from
Mar 2, 2021

Conversation

haijian-vaadin
Copy link
Contributor

@haijian-vaadin haijian-vaadin commented Mar 1, 2021

This hardens the framework against a theoretical timing attack based on
comparing how quickly a request with an invalid CSRF token is rejected.

No tests since this functionality is equivalent to the previous implementation aside from timing differences that would be very fragile to verify in an automated test.

Related to #9875

@haijian-vaadin haijian-vaadin added hilla Issues related to Hilla target/6.0 labels Mar 1, 2021
@haijian-vaadin haijian-vaadin merged commit 11a6ad2 into master Mar 2, 2021
@haijian-vaadin haijian-vaadin deleted the haijian/csrf-token branch March 2, 2021 19:10
vaadin-bot pushed a commit that referenced this pull request Mar 2, 2021
This hardens the framework against a theoretical timing attack based on
comparing how quickly a request with an invalid CSRF token is rejected.

No tests since this functionality is equivalent to the previous implementation aside from timing differences that would be very fragile to verify in an automated test.

Related to #9875
vaadin-bot pushed a commit that referenced this pull request Mar 2, 2021
This hardens the framework against a theoretical timing attack based on
comparing how quickly a request with an invalid CSRF token is rejected.

No tests since this functionality is equivalent to the previous implementation aside from timing differences that would be very fragile to verify in an automated test.

Related to #9875
vaadin-bot pushed a commit that referenced this pull request Mar 2, 2021
This hardens the framework against a theoretical timing attack based on
comparing how quickly a request with an invalid CSRF token is rejected.

No tests since this functionality is equivalent to the previous implementation aside from timing differences that would be very fragile to verify in an automated test.

Related to #9875
vaadin-bot pushed a commit that referenced this pull request Mar 2, 2021
This hardens the framework against a theoretical timing attack based on
comparing how quickly a request with an invalid CSRF token is rejected.

No tests since this functionality is equivalent to the previous implementation aside from timing differences that would be very fragile to verify in an automated test.

Related to #9875
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
hilla Issues related to Hilla +0.0.1
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants