Skip to content

Add "Heal the Breach" protection to compression middlewares #45662

@pbiggar

Description

@pbiggar

Is there an existing issue for this?

  • I have searched the existing issues

Is your feature request related to a problem? Please describe the problem.

It can be dangerous to enable compression on encrypted requests because of BREACH attacks. As a result, many users choose not to enable compression over HTTPS, and multiple dotnet docs warn about using it.

Describe the solution you'd like

A technique called "Heal the breach" can help mitigate BREACH attacks, as discussed in https://ieeexplore.ieee.org/document/9754554. It works by modifying the gzip library to add randomness to the length of the response. If this was added to the asp.net compression middlewares, it could significantly reduce the attack surface due to BREACH.

Additional context

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    ✔️ Resolution: Won't FixResolved because we decided not to change the behavior reported in this issue.Status: Resolvedarea-middlewareIncludes: URL rewrite, redirect, response cache/compression, session, and other general middlewaresfeature-response-compression

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions