You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by "ASF subversion and git services (JIRA)" <ji...@apache.org> on 2019/08/06 11:06:00 UTC
[jira] [Commented] (WICKET-6559) Encrypted page store
[ https://issues.apache.org/jira/browse/WICKET-6559?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16900899#comment-16900899 ]
ASF subversion and git services commented on WICKET-6559:
---------------------------------------------------------
Commit ce6a6870ed61a7a39b917c329104e08a81052514 in wicket's branch refs/heads/master from Emond Papegaaij
[ https://gitbox.apache.org/repos/asf?p=wicket.git;h=ce6a687 ]
WICKET-6559: Decrypting with the wrong key can succeed, but with a different result (incorrect stream)
> Encrypted page store
> --------------------
>
> Key: WICKET-6559
> URL: https://issues.apache.org/jira/browse/WICKET-6559
> Project: Wicket
> Issue Type: New Feature
> Components: wicket
> Reporter: Emond Papegaaij
> Assignee: Emond Papegaaij
> Priority: Major
>
> To make it virtually impossible to tamper with any serialized data on disk, Wicket should encrypt the data with a key bound to the user session. This also prevents accidental leakage of sensitive data (such as passwords) via serialized form contents.
--
This message was sent by Atlassian JIRA
(v7.6.14#76016)