Hi Yannick,
The session ID should not be changed for each new page. SSL was designed
with this session ID to enhance performance so as to not require the need to
renegotiate keys (and thus the associated session ID) between the client and
server for each "transaction" (in this case web page load).  That is, SSL
introduces the notion of a "session" and a sequence of events (e.g. web
pages) associated with that transaction. This differentiates it from
non-session oriented security protocols.

In the earlier days of Netscape server development, the server would cache
session ID's for no longer than 30 seconds. This placed a heavier processing
burden on the server since it was forced to renegotiate a new session ID,
and associated keys, every 30 seconds.  Later we extended it to 24 hours and
this improved performance considerably.  The caching of a session ID on the
server-side (your device is the equivalent of the server) is expected
behavior.

Correlating the IP address and session ID is a reasonable thing to do in my
opinion.  If they do not match you should merely request that the client
reauthenticate themselves at which point you can establish a new session ID.

Eric Greenberg
http://www.seinedynamics.com

-----Original Message-----
From: Yannick Koehler [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 30, 2001 12:39 PM
To: [EMAIL PROTECTED]
Subject: SSL Session Id Chaning?


Hello,

   I'm working at Colubris Networks Inc. and we're building wireless
802.11b access point bridge/router.  The device is configurable through
the web and use SSL.  We've tested many browsers and at the moment
Mozilla is the only one we can't use to configure the product.  Other
browser that have been tested are IE (Windows/Mac), Opera, Netscape
4.75, Netscape 6.

   I'm no expert with SSL and therefore I'm not impliyng that there's a
bug with Mozilla.  I am looking for advice and tips on finding how I can
resolve that issue.

   Here's the way that our web server and configuration module handle
the SSL session in hope that one may find a better way or help me out.

   When the user point his browser on our product's IP address, his IP
is stored and a login page is presented, the user enter his
authentication information and we validate them, upon successful
authentication the SSL Session ID and source IP address of the
authentication is stored and verified constantly.  If one or the other
(IP or SSL ID) changes we drop access to the configuration pages.

   The problem seems that Mozilla's SSL change the SSL ID each time it
ask for a configuration page.  I'm assuming that as the IP doesn't
change.  Is this normal that the session ID for an SSL session change
each time a new web page is loaded?  Our code seems to work fine with
other browser.  The reason we're looking at the SSL Session ID is to
remove the possibility that another PC using the same IP address
connects to the product and try to change the configuration (while a
session was opened with that IP address).

Yannick Koehler

NOTE: If you feel more confortable sending me a direct email please do so.



Reply via email to