lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: lcamtuf at ghettot.org (Michal Zalewski) Subject: Re: a method for bypassing cookie restrictions in web browsers On Mon, 19 Jan 2004, Dave McKinney wrote: > This does appear to be a known way of tracking web users without using > cookies: http://sourcefrog.net/projects/meantime/ Yup, my apologies for this sort-of-false alert. The only excuse I can offer is that I failed to find any related information during a routine run of Google queries, and that the flaw is still very much alive nowadays. The problem is ineed known, both the use of ETags and Last-Modified headers to store data, and the indirect variant I described later on. The issue had been initially reported by Martin Pool here: http://cert.uni-stuttgart.de/archive/bugtraq/2000/03/msg00365.html Cheers, -- ------------------------- bash$ :(){ :|:&};: -- Michal Zalewski * [http://lcamtuf.coredump.cx] Did you know that clones never use mirrors? --------------------------- 2004-01-20 01:57 -- http://lcamtuf.coredump.cx/photo/current/
Powered by blists - more mailing lists