-
Notifications
You must be signed in to change notification settings - Fork 10.4k
Closed
Labels
✔️ Resolution: Won't FixResolved because we decided not to change the behavior reported in this issue.Resolved because we decided not to change the behavior reported in this issue.Status: Resolvedarea-middlewareIncludes: URL rewrite, redirect, response cache/compression, session, and other general middlewaresIncludes: URL rewrite, redirect, response cache/compression, session, and other general middlewaresfeature-response-compression
Description
Is there an existing issue for this?
- I have searched the existing issues
Is your feature request related to a problem? Please describe the problem.
It can be dangerous to enable compression on encrypted requests because of BREACH attacks. As a result, many users choose not to enable compression over HTTPS, and multiple dotnet docs warn about using it.
Describe the solution you'd like
A technique called "Heal the breach" can help mitigate BREACH attacks, as discussed in https://ieeexplore.ieee.org/document/9754554. It works by modifying the gzip library to add randomness to the length of the response. If this was added to the asp.net compression middlewares, it could significantly reduce the attack surface due to BREACH.
Additional context
No response
Metadata
Metadata
Assignees
Labels
✔️ Resolution: Won't FixResolved because we decided not to change the behavior reported in this issue.Resolved because we decided not to change the behavior reported in this issue.Status: Resolvedarea-middlewareIncludes: URL rewrite, redirect, response cache/compression, session, and other general middlewaresIncludes: URL rewrite, redirect, response cache/compression, session, and other general middlewaresfeature-response-compression