You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by "ASF subversion and git services (JIRA)" <ji...@apache.org> on 2019/08/06 11:06:00 UTC

[jira] [Commented] (WICKET-6559) Encrypted page store

    [ https://issues.apache.org/jira/browse/WICKET-6559?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16900899#comment-16900899 ] 

ASF subversion and git services commented on WICKET-6559:
---------------------------------------------------------

Commit ce6a6870ed61a7a39b917c329104e08a81052514 in wicket's branch refs/heads/master from Emond Papegaaij
[ https://gitbox.apache.org/repos/asf?p=wicket.git;h=ce6a687 ]

WICKET-6559: Decrypting with the wrong key can succeed, but with a different result (incorrect stream)


> Encrypted page store
> --------------------
>
>                 Key: WICKET-6559
>                 URL: https://issues.apache.org/jira/browse/WICKET-6559
>             Project: Wicket
>          Issue Type: New Feature
>          Components: wicket
>            Reporter: Emond Papegaaij
>            Assignee: Emond Papegaaij
>            Priority: Major
>
> To make it virtually impossible to tamper with any serialized data on disk, Wicket should encrypt the data with a key bound to the user session. This also prevents accidental leakage of sensitive data (such as passwords) via serialized form contents.



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)