> To play devil's advocate, pure cookie based authentication is not a > panacea. If you allow users to put things like javascript on your site, > or if you have users who exploit ie bugs like the about: cookie domain > bug from last year, cookies can be stolen and session hijacked. pure > cookie auth is definitely a good thing, but does not provide safety in a > number of 'real world' applications.
Yes, I pointed that out in an earlier discussion about this topic. A online-banking site could for example check the browser for certain types of common vulnerabilities and post a nice "please upgrade" dialogue. This would exclude IE by default though, because there are quite a load of unfixed, publically known security bugs. http://www.jscript.dk/unpatched/ listed them, but the page seems to be down now. Google still finds http://www.jscript.dk/unpatched/MS02-023update.html "Yesterday I hosted a list of 14 publickly known unpatched vulnerabilities, today I host a list of 12 such. It can still be found at http://jscript.dk/unpatched/ - Sascha -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php