Dan Hardiker wrote:

>>>Well, more worrisome would be if a bad guy tricks you into clicking on
>>>a link or simply sends you an image in an email that makes a request
>>>to my server with a valid-looking session id.  Then if you go to this
>>>site (that
>>>
>>    I've debunked that scenario already a few times.  The net
>>    result is that this class of attacks is impossible to
>>    prevent.
>>
>>    The assumption in your scenario and the following is this:
>>
>>    The attacker has access to a script X which calls
>>    session_start().
>>
>>    My scenario:
>>
>>    1.) Attacker A accesses X and stores the SID which PHP assigns to
>>him.
>>
>>    2.) A crafts a link containing SID and sends it to victim V.
>>
>>    3.) A keeps SID alive by repeatedly accessing X using SID.
>>
>>    4.) V opens link and authenticates.
>>
>>    5.) A's script notices (4).  A can overtake V's session.
>>
>
>Ive extended the session handling so that upon session start, it takes a
>snapshot of the browser string (and maybe a couple of other
>javascript-retrieved variables about the user's os, eg: the resolution)
>and build up as much of a picture of the client as possible.
>
>Then store this with the session id, and each time its loaded, check that
>the system hasnt changed. Ive found that (although all the data can be
>faked) that the browser string alone causes alot of grief - especially as
>IE's browser string is changed by many plugin programs.
>
>Just a thought.
>

Unfortunately, this info gets obscured by many major (aol) proxy farms 
as well.

>
>
>




-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to