[aur-general] Securing the AUR website
Pierre Schmitz
pierre at archlinux.de
Fri Aug 5 17:36:06 EDT 2011
Hi TUs,
the AUR still handles user logins and sessions in a insecure way that
can easily be exploited. The last approach to use https by default was
denied a long time ago. But I hope you guys will reconsider this
decision.
To prevent session hijacking, mtm attacks or whatnot I'd recommend the
following:
* Redirect all http traffic to https by default
* Set session.cookie_secure = 1 in your php.ini
* If you use setcookie() make sure to set the secure parameter to true
* If you don't require any javascript to access your session data it's
also a good idea to set all cookie to httponly (again via php.ini and if
you use setcookie() directly)
The optional https access as we have now wont work here. Even if you
never forget to add the s to http when you login session data is also
transferred via http. So once you click a non-https link to the AUR it
would be possible for an attacker to hijack your session.
Greetings,
Pierre
--
Pierre Schmitz, https://users.archlinux.de/~pierre
More information about the aur-general
mailing list