This is getting off topic. The website that surrounds our website is
available under multiple domains. I.e. They white label their product.

On Tue, Mar 31, 2015 at 4:52 PM, André Warnier <a...@ice-sa.com> wrote:

> Wesley Acheson wrote:
>
>> Andre that works perfectly fine but not for our use case.
>>
>
> Ok, thanks for the confirmation. My logical world is back on track now.
> Not to nitpick, but your previous post was the first one in which you
> mentioned SSL as part of the equation, wasn't it ?
>
> If you still have a moment : in that previous post, you wrote "Its not
> pratical for us to mandate that they buy an SSL cert for every top level
> domain that contains our application."
> Could you in a few words explain why that would be necessary ?
> I guess that I still do not clearly see that use case.  Maybe just having
> a look at the initial page which you mention, could help ?
>
>
>> On Tue, Mar 31, 2015 at 2:58 PM, André Warnier <a...@ice-sa.com> wrote:
>>
>>  Christopher Schultz wrote:
>>>
>>>  -----BEGIN PGP SIGNED MESSAGE-----
>>>> Hash: SHA256
>>>>
>>>> André,
>>>>
>>>> On 3/30/15 6:07 PM, André Warnier wrote:
>>>>
>>>>  Christopher Schultz wrote:
>>>>>
>>>>>  -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
>>>>>>
>>>>>> Jeffrey,
>>>>>>
>>>>>> On 3/30/15 12:19 PM, Jeffrey Janner wrote:
>>>>>>
>>>>>>  -----Original Message----- From: Christopher Schultz [mailto:chris@
>>>>>>>
>>>>>>>> christopherschultz.net] Sent: Monday, March
>>>>>>>> 30, 2015 10:48 AM To: Tomcat Users List Subject: Re: Post
>>>>>>>> Session Id
>>>>>>>>
>>>>>>>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
>>>>>>>>
>>>>>>>> Wesley,
>>>>>>>>
>>>>>>>> On 3/30/15 3:57 AM, Wesley Acheson wrote:
>>>>>>>>
>>>>>>>>  On Mon, Mar 30, 2015 at 2:17 AM, Christopher Schultz <
>>>>>>>>> ch...@christopherschultz.net> wrote:
>>>>>>>>>
>>>>>>>>> Wesley,
>>>>>>>>>
>>>>>>>>> On 3/29/15 1:15 PM, Wesley Acheson wrote:
>>>>>>>>>
>>>>>>>>>  A team I am working with use tomcat 7 as their web container. The
>>>>>>>>>>
>>>>>>>>>>> application cannot use url session tracking due to compliance
>>>>>>>>>>>> reasons.
>>>>>>>>>>>>
>>>>>>>>>>>> One of the requirements we are facing is that the
>>>>>>>>>>>> application should work in an iframe on the safari
>>>>>>>>>>>> web browser, which blocks all cookies.
>>>>>>>>>>>>
>>>>>>>>>>>>  Do you mean that Safari has been configured to block all
>>>>>>>>>>> cookies?
>>>>>>>>>>>
>>>>>>>>>> Because Safari won't block cookies just because
>>>>>>>>> you are using an <iframe
>>>>>>>>>
>>>>>>>>>  .
>>>>>>>>>>
>>>>>>>>>>> Should have said its a third party domain name. That
>>>>>>>>>>>
>>>>>>>>>> can't change easily. Should have wrote Safari blocks all
>>>>>>>>>> third party cookies.
>>>>>>>>>>
>>>>>>>>>>  Okay, that explains it.
>>>>>>>>>
>>>>>>>> Let me ask you... why is a path parameter (;jsessionid=f00)
>>>>>>>> unacceptable but not a request parameter? Or if it that you
>>>>>>>> want to have the parameters be in POST-parameters only?
>>>>>>>>
>>>>>>>> In terms of forgery and/or capturing session identifiers, there's
>>>>>>>> really no difference from a security perspective of
>>>>>>>> any of these strategies.
>>>>>>>>
>>>>>>>> - -chris
>>>>>>>>
>>>>>>>>  I may be being a little naïve here, but would the
>>>>>>> sessionCookieDomain
>>>>>>> parameter of the <Context> element work for
>>>>>>> the OP here?
>>>>>>>
>>>>>>>  No, because the "domain" of the "page" is considered to be
>>>>>> separate from the application being used, here (in an <iframe>).
>>>>>> Setting the domain of the cookie to the page-domain would
>>>>>> probably result in the cookie being (possibly) ignored by the
>>>>>> browser (because it came from the wrong domain) or the cookie
>>>>>> wouldn't be sent to the application because the domain wouldn't
>>>>>> match.
>>>>>>
>>>>>> That does bring-up another point, though: could the page-domain
>>>>>> be used to proxy requests through to the application? If so, none
>>>>>> of this work might need to be done. The browser would request
>>>>>> https://host.com/app and host.com would proxy through to
>>>>>> https://otherhost.com/app. It's more configuration and
>>>>>> networking work, but it's less application work which may be a
>>>>>> win.
>>>>>>
>>>>>>  Re-reading this thread from the beginning, I still have a doubt as
>>>>>>
>>>>> to whether I understand the issue correctly. That is because, as
>>>>> far as I know, an <iframe> within a Windows, is its own Window
>>>>> object, with its own "baseURI" etc.. And from the server's point of
>>>>> view, it is in fact like a separate "browser window", from which
>>>>> requests originate and to which responses are being sent, and it is
>>>>> for all intents and purposes indistinguishable from just another
>>>>> separate Window or Tab that would be opened on the same workstation
>>>>> by the same or another browser. So under what circumstances can a
>>>>> "session-id cookie" being sent by Tomcat to that "iframe Window" be
>>>>> considered as a third-party cookie and blocked by a browser ? (And
>>>>> if it were, would that not be a browser bug ?)
>>>>>
>>>>>  http://www.mendoweb.be/blog/internet-explorer-safari-
>>>> third-party-cookie-
>>>> problem/
>>>> http://stackoverflow.com/a/486569/276232
>>>>
>>>> Wesley, it looks like there are some hacks available that might solve
>>>> your problem.
>>>>
>>>> http://stackoverflow.com/a/4702110/276232
>>>> http://anantgarg.com/2010/02/18/cross-domain-cookies-in-safari/
>>>>
>>>> Unfortunately, it looks like these hacks are outdated and no longer
>>>> work: WebKit patched this "bug" so that iframe cookies are again ignored
>>>> ..
>>>>
>>>> It looks like there might be some other possibilities, but I can't
>>>> verify them ATM.
>>>>
>>>>
>>>>  So I would consider this as a browser bug.  But nevertheless, that's
>>> how
>>> they work and one has to live with this for now.  So back to the drawing
>>> board.
>>> The question here is : do the browsers reject the cookie
>>> a) just because it is addressed to an <iframe> ?
>>>  or
>>> b) because (while being addressed to an <iframe>) the "domain" part of
>>> that cookie is determined to be different from the one from which the
>>> main
>>> window content is coming ?
>>>
>>> If (b), then the easiest solution would be to make it so that it isn't
>>> so..
>>>
>>> Let's imagine that the first main page is seen by the browser as coming
>>> from "http://serverA.domainA.com";, and that this contains an <iframe>
>>> loaded from "http://serverB.domainB.com";. With the response going to the
>>> iframe, comes a session-id cookie, whose domain portion is also "
>>> serverB.domainB.com", and this is (dubiously in my view) determined to
>>> be
>>> unacceptable by the browser, because it differs from "
>>> serverA.domainA.com".
>>> So the browser ignores the cookie.
>>>
>>> That issue would be solved, if the content of the <iframe> appeared to
>>> the
>>> browser as also come from "serverA.domainA.com" (like the main window's
>>> content), wouldn't it ?
>>>
>>> If so, why not make the server "serverA.domainA.com" act as a reverse
>>> proxy for the server serverB.domainB.com, and load the <iframe> from
>>> serverA too ?
>>>
>>>
>>>
>>>
>>>
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>>> For additional commands, e-mail: users-h...@tomcat.apache.org
>>>
>>>
>>>
>>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to