summaryrefslogtreecommitdiff
path: root/www/p5-WWW-CSRF
diff options
context:
space:
mode:
authormarkd <markd@pkgsrc.org>2014-09-04 22:01:35 +0000
committermarkd <markd@pkgsrc.org>2014-09-04 22:01:35 +0000
commit9e71625fa2db2e4411379b07d6106eee9d6f82d2 (patch)
treeeaa1374e35c246991a68ccc5a69b9c5697409425 /www/p5-WWW-CSRF
parent0b4b02f3bf2497f25fc9f071cf4cacd86c2a13bb (diff)
downloadpkgsrc-9e71625fa2db2e4411379b07d6106eee9d6f82d2.tar.gz
Import p5-WWW-CSRF 1.00
This module generates tokens to help protect against a website attack known as Cross-Site Request Forgery (CSRF, also known as XSRF). CSRF is an attack where an attacker fools a browser into make a request to a web server for which that browser will automatically include some form of credentials (cookies, cached HTTP Basic authentication, etc.), thus abusing the web server's trust in the user for malicious use. The most common CSRF mitigation is sending a special, hard-to-guess token with every request, and then require that any request that is not idempotent (i.e., has side effects) must be accompanied with such a token. This mitigation depends critically on the fact that while an attacker can easily make the victim's browser make a request, the browser security model (same-origin policy, or SOP for short) prevents third-party sites from reading the results of that request.
Diffstat (limited to 'www/p5-WWW-CSRF')
-rw-r--r--www/p5-WWW-CSRF/DESCR14
-rw-r--r--www/p5-WWW-CSRF/Makefile19
-rw-r--r--www/p5-WWW-CSRF/distinfo5
3 files changed, 38 insertions, 0 deletions
diff --git a/www/p5-WWW-CSRF/DESCR b/www/p5-WWW-CSRF/DESCR
new file mode 100644
index 00000000000..c744e4e85a4
--- /dev/null
+++ b/www/p5-WWW-CSRF/DESCR
@@ -0,0 +1,14 @@
+This module generates tokens to help protect against a website attack
+known as Cross-Site Request Forgery (CSRF, also known as XSRF). CSRF
+is an attack where an attacker fools a browser into make a request to
+a web server for which that browser will automatically include some
+form of credentials (cookies, cached HTTP Basic authentication, etc.),
+thus abusing the web server's trust in the user for malicious use.
+
+The most common CSRF mitigation is sending a special, hard-to-guess
+token with every request, and then require that any request that is
+not idempotent (i.e., has side effects) must be accompanied with such
+a token. This mitigation depends critically on the fact that while an
+attacker can easily make the victim's browser make a request, the
+browser security model (same-origin policy, or SOP for short) prevents
+third-party sites from reading the results of that request.
diff --git a/www/p5-WWW-CSRF/Makefile b/www/p5-WWW-CSRF/Makefile
new file mode 100644
index 00000000000..0f994c47087
--- /dev/null
+++ b/www/p5-WWW-CSRF/Makefile
@@ -0,0 +1,19 @@
+# $NetBSD: Makefile,v 1.1 2014/09/04 22:01:35 markd Exp $
+
+DISTNAME= WWW-CSRF-1.00
+PKGNAME= p5-${DISTNAME}
+CATEGORIES= www perl5
+MASTER_SITES= ${MASTER_SITE_PERL_CPAN:=WWW/}
+LICENSE= ${PERL5_LICENSE}
+
+MAINTAINER= pkgsrc-users@NetBSD.org
+HOMEPAGE= http://search.cpan.org/dist/WWW-CSRF/
+COMMENT= Generate and check tokens to protect against CSRF attacks
+
+DEPENDS+= p5-Bytes-Random-Secure>=0.26:../../security/p5-Bytes-Random-Secure
+DEPENDS+= p5-Digest-HMAC-[0-9]*:../../security/p5-Digest-HMAC
+
+PERL5_PACKLIST= auto/WWW/CSRF/.packlist
+
+.include "../../lang/perl5/module.mk"
+.include "../../mk/bsd.pkg.mk"
diff --git a/www/p5-WWW-CSRF/distinfo b/www/p5-WWW-CSRF/distinfo
new file mode 100644
index 00000000000..f866bf3e35c
--- /dev/null
+++ b/www/p5-WWW-CSRF/distinfo
@@ -0,0 +1,5 @@
+$NetBSD: distinfo,v 1.1 2014/09/04 22:01:35 markd Exp $
+
+SHA1 (WWW-CSRF-1.00.tar.gz) = 9868f810646815d4f6b4d1717dfaf21d901e76a5
+RMD160 (WWW-CSRF-1.00.tar.gz) = 3455d1851451d51e4bd52e7fc1b3443537110fdb
+Size (WWW-CSRF-1.00.tar.gz) = 5176 bytes