To insert a new comment on this old item:

What about sockets?  I am in the middle of trying to use $c =
$r->connection and $c->remote_addr as part of the cookie name.  (So far
I am having trouble with the fact that remote_addr returns packed info,
and I am still searching for how to unpack it - if you know, tell me!).

It's not 'foolproof', but how many casual cookie stealers can force
their browser to use a particular socket?

This little method would even allow me to open multiple windows into a
secured area, each with a different username, etc. (Very usefull during
user interface development, etc. where menus differ based on some
criteria for users)

--Jon Robison


David Young wrote:
> 
> fliptop wrote:
> > Joe Breeden wrote:
> >>
> >> How does this work in an environment with two (or more) computers with the
> >> exact same configuration, and probably the same HTTP_USER_AGENT behind the
> >> same proxy? How do you know that one user isn't using another users session?
> >
> > you don't.  the session hijacker still would need to know the real
> > user's username, password, and HTTP_USER_AGENT configuration.
> 
> The session hijacker would not need to know the username and password. They
> would only need to sniff the cookie from the network, and then send it from
> a client identifying itself as the same User Agent.
> 
> > my point
> > was that this solves the problem of using the ip address in the md5 hash
> > when the client is behind a proxy server.
> 
> This does not solve the problem: IP address of users behind Proxy is not
> unique. The User Agent is not unique either. Using User Agent solves
> nothing, and is in fact far less secure, since the client can set the User
> Agent header to be just about anything. At least the IP address has to be
> correct (but not unique) if the client wants to get a response.

Reply via email to