According to Tim Nowaczyk:
>
>  My company implemented this but went one more step.  They created a
>  file that had (IP, ticket) pairs. The ticket was passed around in
>  URLs, but wasn't valid unless it came from the specific IP.  To
>  pretend to be someone else, one would have to spoof their IP and
>  guess the value of their (10 hour life-cycle) ticket.  We did this,
>  originally, because we wanted to support web browsers that didn't
>  use cookies.  The file was, actually, more like (IP, ticket,
>  cookie-type-options-and-settings).  It worked well for us.
>

You are lucky.  There are two cases which will invalidate this
solution:

1) A bunch of users are behind a single web proxy (such as squid) so
   they all appear to come from the same IP address.  This means you
   will have multiple tickets for the same IP.

2) A bunch of users are behind a multi-parented web proxy, in which
   case the users will appear to come from one of a number of
   addresses.  This leads to bizarre behaviour - the user
   authenticates successfully but gets kicked off later because the
   ticket/IP pair don't match because a different parent to the one
   the user authenticated on happened to handle the request.

-- 
===============================================================================
Brett Lymn, Computer Systems Administrator, BAE SYSTEMS
===============================================================================


Reply via email to