Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Can I stop the Etag header from leaking inode numbers?

etag header inode leaking Numbers
0
10 Posted

Can I stop the Etag header from leaking inode numbers?

0
10

Yes. You can use Etag hashing. This concatenates the Etag that is normally generated with a secret key, hashes with the SHA1 algorithm, and uses the result as the Etag. OpenBSD made a similar change to httpd in version 3.2. They store the secret key in the file logs/etag-state but Antiweb stores it in the worker conf file which should of course be stored outside of the HTML root. Good secret keys include Antiweb session IDs: $ antiweb -repl * (aw-n-bit-session-id 128) “8odxf2wrq7tbehjkwvp0h7vqu” aw-n-bit-session-id will use /dev/arandom or /dev/urandom to seed the ISAAC random number generator and return a random n-bit value in base 36. 128 bits is fine. Now add the following to a handler in your worker conf file: :etags :etag-hash “8odxf2wrq7tbehjkwvp0h7vqu” Hoytech does not use Etag hashing on our servers so you can snoop on our inodes if you want. The only plausible attack seems to involve NFS (Network File System). If you use NFS on your webserver, enable Etag hashing. To avoid the

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123