Would implementing signed URL's be an effective security measure to prevent URL tampering and poisoning on public facing resources accessed via a GET request.
e.g. http://www.domain.com/:url_to_resource/:hash http://cdn.domain.com/:url_to_resource.js?:hash
Hash in my case would correspond to my cache key for the resource.
Any feedback, improvements, or critiques would be greatly appreciated.
When a user first hits the page, you create a HTTP only, secure Cookie HMAC(SessionID, SharedSecret, scrypt(Password), expires). Cookie is associated with a DB table Session(SessionID, data, HMAC, signature, expires). All data is encrypted on the client so the server can never read data. (Plausible Deniability).
– Null Aug 12 '13 at 13:33Although my original questions was that URL signing could be used to protect against allot of URI exploits so I attempted to generalize the question to make the question more useful to others.
e.g. /index.php?:hash&file=../../../etc/password
– Null Aug 12 '13 at 14:30