idp.session.consistentAddress and real security implications.
Cantor, Scott
cantor.2 at osu.edu
Mon Apr 25 15:55:20 EDT 2016
> That means it's completely vulnerable via XSS attacks for theft, tampering,
> etc, if the attacker manages to get the browser to load and run Javascript.
I assumed.
> For that reason, the info I found recommended that local storage not be
> used for the storage of any security-sensitive info, so as OAuth security
> tokens or any other kind of bearer token, and of course not passwords,
> secrets, etc.
And cookies are the original bearer token and are obviously vulnerable, which is where we came in.
> I was actually going to bring up soon what and how the IdP is actually doing
> with local storage and the client-side storage service impl, just so I
> understand better better the tradeoffs in general.
It stores a lot of potentially sensitive info, encrypted with AES-GCM. It doesn't store passwords unless you tell it to.
-- Scott
More information about the users
mailing list