> To play devil's advocate, pure cookie based authentication is not a
> panacea.  If you allow users to put things like javascript on your site,
> or if you have users who exploit ie bugs like the about: cookie domain
> bug from last year, cookies can be stolen and session hijacked.  pure
> cookie auth is definitely a good thing, but does not provide safety in a
> number of 'real world' applications.

    Yes, I pointed that out in an earlier discussion about this
    topic.  A online-banking site could for example check the
    browser for certain types of common vulnerabilities and post
    a nice "please upgrade" dialogue.

    This would exclude IE by default though, because there are
    quite a load of unfixed, publically known security bugs.

    http://www.jscript.dk/unpatched/ listed them, but the page
    seems to be down now.  Google still finds

    http://www.jscript.dk/unpatched/MS02-023update.html

    "Yesterday I hosted a list of 14 publickly known unpatched
    vulnerabilities, today I host a list of 12 such. It can still
    be found at http://jscript.dk/unpatched/

    - Sascha


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to