Changes

Jump to: navigation, search

Security/Origin

1 byte added, 23:29, 20 July 2009
m
Advantage of more than one bit of data
One similar approach to solving CSRF is to send a "Same-Origin" header with requests, setting its value to "YES" if the referrer is of the same origin as the requested content and "NO" otherwise. While this one-bit approach can be effective against CSRF, it doesn't seem robust enough for deployment.
Some sites post data cross-site when they own multiple domains. Additionally, a state-changing request might not be actually ''intentedintended'': an open redirect might be exploited, thus spoofing the content submission. Finally, a small amount of extra complexity (and request size) provides flexibility so this feature can be used not only as CSRF protection but also in other scenarios where knowing the origin of a request (and its redirect chain) might be handy.
=== Selection of "null" token ===
Canmove, confirm
1,537
edits

Navigation menu