document cookie usage, warn about domain cookies
This commit is contained in:
parent
fdd979d5e1
commit
24ad97c0ef
@ -75,3 +75,31 @@ XSS protection
|
|||||||
==============
|
==============
|
||||||
|
|
||||||
Django's templating engine html-escapes inputs by default.
|
Django's templating engine html-escapes inputs by default.
|
||||||
|
|
||||||
|
|
||||||
|
Cookies
|
||||||
|
=======
|
||||||
|
|
||||||
|
The software ("as is") uses these cookies:
|
||||||
|
|
||||||
|
* "csrftoken" (host-only, for CSRF protection)
|
||||||
|
* "sessionid" (host-only, to keep the session when you have logged-in to the
|
||||||
|
web interface)
|
||||||
|
|
||||||
|
|
||||||
|
Be careful with domain cookies
|
||||||
|
------------------------------
|
||||||
|
|
||||||
|
The software ("as is") does not use any domain cookies.
|
||||||
|
|
||||||
|
In case you modify the software, please be extremely cautious with domain
|
||||||
|
cookies and in case of doubt, do rather not use them.
|
||||||
|
|
||||||
|
If you use domain cookies (like for ".yourservice.net", the leading dot
|
||||||
|
makes it a domain cookie), all hosts in that domain would be able to read
|
||||||
|
and write these cookies. Your site (at e.g. www.yourservice.net), but also
|
||||||
|
users' sites (like attacker.yourservice.net).
|
||||||
|
|
||||||
|
Obviously, this might lead to security issues with stealing, modifying and
|
||||||
|
faking domain cookies.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user