Dan Hardiker wrote:

>>It is also very conceivable that a person would send a link to a java
>>applet or any other kind of wrapper (PHP or other CGI actually would be
>>able to establish the connection on the server side always sending the
>>same user agent string and sending back the data from your site) to
>>establish the session in which case this is rendered useless.
>>
>
>So because its not flawless, we shouldnt try to get as close to perfection
>as we can?
>
>I know its not water-tight by any stretch of the imagination, but the more
>checking in there, the harder it is for hackers to get the foot in the
>door and penetrate. The more abstract the system is (especially on a site
>by site basis) the more work a cracker has to do to work out how a host is
>authenticated.
>

To me this thread has two main issues:

1) don't false advertise:  I agree that most of these methods are good 
steps in the right direction, but it's also important (IMHO) to not 
label them as 'completely secure'.  I think that is misleading. 
 Labeling them as 'good', 'better', 'best available' is swell (and 
should be done - people need to know the best course of action), but 
none of them are perfect, and it's important to note that.

2) False-positives suck: Validating session auth based of ip or 
user_agent permanency will simply not work.  People coming from places 
like AOL will light up your logs with warnings about potential session 
hijacking.  To me, this is really bad.  It clutters the logs with a lot 
of false-positive security violations, making it even harder to detect 
the real ones.  We tried user_agent matching at my last shop.  We were 
getting 10-20 alerts a second while we had it on.  Largely from aol.

George




-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to