On Jan 20, 2011 2:50 PM, "Celejar" <cele...@gmail.com> wrote:
>
> On Thu, 20 Jan 2011 03:36:03 -0600
> Dave Sherohman <d...@sherohman.org> wrote:
>
> ...
>
> > Some sites do associate the originating IP address with the session data
> > to help protect against session hijacking, but this is not overly
> > widespread and, even when it is employed, it has issues with proxies
> > (which can cause multiple users to appear on a single address) or
> > reverse proxies (which can cause a single user to appear on multiple
> > addresses), so https really is the only surefire way to prevent it.
>
> And it also won't help against an attacker who can use your IP address,
> such as a MITM attacker from the local network segment.
>

Unless you give them a cert and then proxy their connection... you're not
really breaking ssl there though. The handshake and encryption is still
sound.

Reply via email to