nextcloud/tests/lib/appframework
Lukas Reschke 8313a3fcb3 Add mitigation against BREACH
While BREACH requires the following three factors to be effectively exploitable we should add another mitigation:

1. Application must support HTTP compression
2. Response most reflect user-controlled input
3. Response should contain sensitive data

Especially part 2 is with ownCloud not really given since user-input is usually only echoed if a CSRF token has been passed.

To reduce the risk even further it is however sensible to encrypt the CSRF token with a shared secret. Since this will change on every request an attack such as BREACH is not feasible anymore against the CSRF token at least.
2015-08-14 01:31:32 +02:00
..
controller Add mitigation against BREACH 2015-08-14 01:31:32 +02:00
db If the execute method on the mapper receives an assoc array, it binds by value instead of index 2015-03-19 17:08:46 +01:00
dependencyinjection Add mitigation against BREACH 2015-08-14 01:31:32 +02:00
http Add mitigation against BREACH 2015-08-14 01:31:32 +02:00
middleware Add mitigation against BREACH 2015-08-14 01:31:32 +02:00
routing add test for factories 2015-07-25 01:59:30 +02:00
utility Merge pull request #17982 from owncloud/appframework-sanitize-name 2015-08-12 12:19:24 +02:00
AppTest.php AppFramework StreamResponse 2015-02-27 15:42:33 +01:00