So you wish to prevent your users from forging GET/POST values and are
willing to rely on client-side cookies ?
How is that any safer ?

On Tue, 2002-08-20 at 09:18, Marko Karppinen wrote:

    Sascha:
    >     If you want your site to be safe, enable
    >     session.use_only_cookies and be done with it.  No amount of
    >     checking on the server side can otherwise prevent this class
    >     of attacks.
    
    By the way, does session.use_only_cookies work with 
    session.use_cookies=off?
    
    I'm using an alternative method (HTTP Basic Authentication) for the 
    session
    id propagation, and would like to prevent users from setting the sid in 
    get/post
    parameters.
    
    mk
    
    
    -- 
    PHP Development Mailing List <http://www.php.net/>
    To unsubscribe, visit: http://www.php.net/unsub.php
    

Xavier Spriet
Developer/Administrator/Apache Build
Next Dimension Inc.
[EMAIL PROTECTED]
Tel: (519)-945-2032 Ext. 233

Reply via email to