
Full Disclosure mailing list archives
Re: SSL VPNs and security
From: Tim <tim-security () sentinelchicken org>
Date: Fri, 9 Jun 2006 10:23:30 -0400
That depends on whether the solution tries to solve single-sign-on problems as well. If the vendor is trying to handle SSO in such an environment, then they are probably using domain cookies. The problems are exactly the same as the ones Michal listed, plus some additional ones specific to domain cookies.
Right, that does make it difficult. There's probably work arounds, but they may be browser-specific. Wildcard cookies, cookies set to other origins, or somehow setting document.domain back to the base domain after the initial page load might help, but some would probably present the same problem. The web was never designed for complex application development. At least, web standards aren't. Use a real VPN. cheers, tim _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- SSL VPNs and security Michal Zalewski (Jun 08)
- Message not available
- Re: SSL VPNs and security Michal Zalewski (Jun 08)
- Re: SSL VPNs and security E Mintz (Jun 09)
- Re: SSL VPNs and security Michal Zalewski (Jun 08)
- Message not available
- Message not available
- Re: SSL VPNs and security E Mintz (Jun 09)
- Re: SSL VPNs and security Tim (Jun 09)
- Re: SSL VPNs and security Brian Eaton (Jun 09)
- Re: SSL VPNs and security Tim (Jun 09)
- Re: SSL VPNs and security Q-Ball (Jun 12)
- Re: SSL VPNs and security Ray P (Jun 13)
- Re: SSL VPNs and security Q-Ball (Jun 13)
- Re: SSL VPNs and security Brian Eaton (Jun 09)
- Re: SSL VPNs and security Tim (Jun 09)
- Re: SSL VPNs and security Michael Holstein (Jun 09)
- Re: SSL VPNs and security Tim (Jun 09)
- Re: SSL VPNs and security Brian Eaton (Jun 09)
- Re: SSL VPNs and security Michael Holstein (Jun 09)