Graham,

First, you need to switch to the [EMAIL PROTECTED]
list as the houseoffusion list is being replaced.

Your scheme is a good one except:

1) when dealing with large ISP's like AOL. When
surfing thru a large ISP, your IP address can switch
many times. Same thing happens to DSL users, unless
they have paid for a static IP (not likely).

2) You can spoof an IP address fairly easily. In fact,
you can spoof almost anything sent in the header
fairly easily.

Nate

--- Graham Wood <[EMAIL PROTECTED]> wrote:
> Hi,
> 
> I am currently trying to develop a secure
> application using fusebox and 
> wondered if anyone can see any security problems
> with the following idea.
> 
> User logs in using a secure connection, on
> successful login the users IP is 
> logged using CGI.REFERER and then the user is
> allocated a unique session 
> number(details stored in database). Each link
> throughout the site passes 
> back to the server the session number which then
> compares the IP of the 
> requesting client to the  IP of the user who logged
> in originally and was 
> allocated this session number.
> 
> I am sure there are lots of ways to achieve the same
> goal I just wondered 
> if there are any holes in this design.
> 
> Thanks
> 
> 
>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Get the mailserver that powers this list at http://www.coolfusion.com

Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to