On Mon, 19 Aug 2002, Rasmus Lerdorf wrote: > But could you at least answer the question? What is the advantage of > allowing user-supplied new session ids? I see no reason not to add a > check for this.
For example, I have a set of C programs for IRCG load testing. It uses a simple FSM to generate HTTP requests and waste incoming data (like 50K concurrent connections). If this client could not use arbitrary session ids (mysid$running_number), I'd have to actually analyze HTTP replies and the icky Cookie header. My stance is this: You are either vulnerable to this class of attacks -- or you are not. There is no middle ground. To conclude: Don't trade useful features for pseudo security. Removing this feature just increases the feeling of having a 'secure' site and decreases the desire to protect oneself by activating session.use_only_cookies. - Sascha -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php