On Jul 29, 8:07 pm, 7stud -- <[email protected]> wrote:
> Walter Davis wrote in post #1013792:
>
> > The only way we have determined that this is possible is with physical
> > access to the computer.
>
> Are you saying that the malicious user can only gain access to the
> user's account while using the user's computer?  Or, is it true that
> once the malicious user has a copy of the cookie, he can access the
> account from any computer?
>
In the scheme you've outlined, I think it would work from any
computer. It could be extended though. I once implemented a scheme
whereby the ip address was part of the cryptographically signed info
so that the persistent cookie was valid only from that ip address
(obviously this has some limitations/problems too)

Frdd


> > As in any security scheme, that pretty well
> > trumps anything that doesn't rely on the user logging in every time,
> > and time-limited sessions.
>
> I wasn't critiquing rails, I was trying to understand why the author of
> the book said the persistent session was impervious to attack--after
> himself raising the specter of a malicious user gaining access to the
> user's computer.  His explanation didn't make sense to me.
>
> --
> Posted viahttp://www.ruby-forum.com/.

-- 
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Talk" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-talk?hl=en.

Reply via email to