Dan Hardiker wrote: > > >> Well, more worrisome would be if a bad guy tricks you into clicking on > >> a link or simply sends you an image in an email that makes a request > >> to my server with a valid-looking session id. Then if you go to this > >> site (that > > > > I've debunked that scenario already a few times. The net > > result is that this class of attacks is impossible to > > prevent. > > > > The assumption in your scenario and the following is this: > > > > The attacker has access to a script X which calls > > session_start(). > > > > My scenario: > > > > 1.) Attacker A accesses X and stores the SID which PHP assigns to > > him. > > > > 2.) A crafts a link containing SID and sends it to victim V. > > > > 3.) A keeps SID alive by repeatedly accessing X using SID. > > > > 4.) V opens link and authenticates. > > > > 5.) A's script notices (4). A can overtake V's session. > > Ive extended the session handling so that upon session start, it takes a > snapshot of the browser string (and maybe a couple of other > javascript-retrieved variables about the user's os, eg: the resolution) > and build up as much of a picture of the client as possible.
So you should pick upt that 'initial propagation mode', so later someone can decide to block a client shift in that while pretending to remain the same client. Giancarlo -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php