[html5] r8823 - [e] (0) Mention cookie-bombing in the appcache section Affected topics: Offline [...]

whatwg at whatwg.org whatwg at whatwg.org
Fri Sep 26 16:44:22 PDT 2014


Author: ianh
Date: 2014-09-26 16:44:19 -0700 (Fri, 26 Sep 2014)
New Revision: 8823

Modified:
   complete.html
   index
   source
Log:
[e] (0) Mention cookie-bombing in the appcache section
Affected topics: Offline Web Applications, Security

Modified: complete.html
===================================================================
--- complete.html	2014-09-26 18:13:08 UTC (rev 8822)
+++ complete.html	2014-09-26 23:44:19 UTC (rev 8823)
@@ -62174,7 +62174,8 @@
   whose manifest is declared as that first file. Once the user has been directed to that second
   file, all subsequent accesses to any file covered by the given fallback namespace while either the
   user or the site is offline will instead show that second file. Targetted denial-of-service
-  attacks can be used to ensure that the site appears offline.</p>
+  attacks or cookie bombing attacks (where the client is made to send so many cookies that the
+  server refuses to process the request) can be used to ensure that the site appears offline.</p>
 
   <p>To mitigate this, manifests can only specify fallbacks that are in the same path as the
   manifest itself. This means that a content injection upload vulnerability in a particular
@@ -62182,12 +62183,14 @@
   subdirectories. If there is no way to inject a file into the root directory, the entire site
   cannot be taken over.</p>
 
-  <p>If a site has been attacked in this way, simply removing the offending manifest will eventually
+  <p>If a site has been attacked in this way, simply removing the offending manifest might eventually
   clear the problem, since the next time the manifest is updated, a 404 error will be seen, and the
   user agent will clear the cache. "Eventually" is the key word here, however; while the attack on
   the user or server is ongoing, such that connections from an affected user to the affected site
   are blocked, the user agent will simply assume that the user is offline and will continue to use
-  the hostile manifest.</p>
+  the hostile manifest. Unfortunately, if a cookie bombing attack has also been used, merely
+  removing the manifest is insufficient; in addition, the server has to be configured to return a
+  404 or 410 response instead of the 413 "Request Entity Too Large" response.</p>
 
   <p>TLS does not inherently protect a site from this attack, since the attack relies on content
   being served from the server itself. Not using application caches also does not prevent this

Modified: index
===================================================================
--- index	2014-09-26 18:13:08 UTC (rev 8822)
+++ index	2014-09-26 23:44:19 UTC (rev 8823)
@@ -62174,7 +62174,8 @@
   whose manifest is declared as that first file. Once the user has been directed to that second
   file, all subsequent accesses to any file covered by the given fallback namespace while either the
   user or the site is offline will instead show that second file. Targetted denial-of-service
-  attacks can be used to ensure that the site appears offline.</p>
+  attacks or cookie bombing attacks (where the client is made to send so many cookies that the
+  server refuses to process the request) can be used to ensure that the site appears offline.</p>
 
   <p>To mitigate this, manifests can only specify fallbacks that are in the same path as the
   manifest itself. This means that a content injection upload vulnerability in a particular
@@ -62182,12 +62183,14 @@
   subdirectories. If there is no way to inject a file into the root directory, the entire site
   cannot be taken over.</p>
 
-  <p>If a site has been attacked in this way, simply removing the offending manifest will eventually
+  <p>If a site has been attacked in this way, simply removing the offending manifest might eventually
   clear the problem, since the next time the manifest is updated, a 404 error will be seen, and the
   user agent will clear the cache. "Eventually" is the key word here, however; while the attack on
   the user or server is ongoing, such that connections from an affected user to the affected site
   are blocked, the user agent will simply assume that the user is offline and will continue to use
-  the hostile manifest.</p>
+  the hostile manifest. Unfortunately, if a cookie bombing attack has also been used, merely
+  removing the manifest is insufficient; in addition, the server has to be configured to return a
+  404 or 410 response instead of the 413 "Request Entity Too Large" response.</p>
 
   <p>TLS does not inherently protect a site from this attack, since the attack relies on content
   being served from the server itself. Not using application caches also does not prevent this

Modified: source
===================================================================
--- source	2014-09-26 18:13:08 UTC (rev 8822)
+++ source	2014-09-26 23:44:19 UTC (rev 8823)
@@ -84016,7 +84016,8 @@
   whose manifest is declared as that first file. Once the user has been directed to that second
   file, all subsequent accesses to any file covered by the given fallback namespace while either the
   user or the site is offline will instead show that second file. Targetted denial-of-service
-  attacks can be used to ensure that the site appears offline.</p>
+  attacks or cookie bombing attacks (where the client is made to send so many cookies that the
+  server refuses to process the request) can be used to ensure that the site appears offline.</p>
 
   <p>To mitigate this, manifests can only specify fallbacks that are in the same path as the
   manifest itself. This means that a content injection upload vulnerability in a particular
@@ -84024,12 +84025,14 @@
   subdirectories. If there is no way to inject a file into the root directory, the entire site
   cannot be taken over.</p>
 
-  <p>If a site has been attacked in this way, simply removing the offending manifest will eventually
+  <p>If a site has been attacked in this way, simply removing the offending manifest might eventually
   clear the problem, since the next time the manifest is updated, a 404 error will be seen, and the
   user agent will clear the cache. "Eventually" is the key word here, however; while the attack on
   the user or server is ongoing, such that connections from an affected user to the affected site
   are blocked, the user agent will simply assume that the user is offline and will continue to use
-  the hostile manifest.</p>
+  the hostile manifest. Unfortunately, if a cookie bombing attack has also been used, merely
+  removing the manifest is insufficient; in addition, the server has to be configured to return a
+  404 or 410 response instead of the 413 "Request Entity Too Large" response.</p>
 
   <p>TLS does not inherently protect a site from this attack, since the attack relies on content
   being served from the server itself. Not using application caches also does not prevent this



More information about the Commit-Watchers mailing list