Good point. I realized risk #1 could be reduced by storing the secret in a secure place on the deployment server rather than under source control.
On Feb 21, 3:20 pm, Frederick Cheung <[email protected]> wrote: > On Feb 21, 5:06 pm, "Eric L." <[email protected]> wrote: > > > Should I be concerned if I am using the default cookie-based session > > storage for a high security application? Nothing sensitive will be > > stored on the cookie, but it's critical that one user cannot gain > > access to another user's account. The security risks I see with > > cookie-based storage are: > > > 1. There is a single point of failure. If the secret key is stolen > > (for example, by a rogue developer), the person in possession of the > > key can log into any account he wishes. > > > 2. It's not been as widely used as database-backed session, and > > therefore not as tested. > > given that it's been the default for well over a year I would question > that. > > > 3. The cryptographic algorithm could be compromised, which is always a > > possibility (however unlikely.) > > While the risks in 1 and 3 do exist I don't think it's a game changer > compared to the other risks involved (people setting weak passwords, > the cryptographic algorithm securing your ssh or ssl sessions being > compromised and data being leaked that way, the rogue developer > harvesting data straight from the database, cookies being stolen via > XSS attacks etc.) > > Fred --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/rubyonrails-talk?hl=en -~----------~----~----~----~------~----~------~--~---

