Emmanuel Blot wrote:
I hadn't considered the session/auth tables until I read this. I do full dump
  of the project DBs prior to archiving. Thankfully I haven't had to restore
one yet, but I assume I'd be opening up a security hole and a half by
restoring these tables?


I couldn't tell: I never considered the security issues up to now, and
I don't know enough about security matter to give any useful answer
;-)

It's not a Trac issue, really, just something admins might want to be wary of when restoring dumps. This probably applies to any DB that stores auth cookies.

If I decided to deny access to user 'X' after some malicious damage was caused, I could restore from a backup and delete their user account, but it could still have a valid session cookie for user X that would grant them have full privileges until it expired.

I'm using Basic auth myself, so the auth_cookie table is empty. Removing the htpasswd entry would have the desired immediate effect. I suppose it would only be an issue if the registration system is in use (or accountmanager plugin), but I haven't used those so I can't confirm.

Cheers,
Manu
_______________________________________________
Trac mailing list
[email protected]
http://lists.edgewall.com/mailman/listinfo/trac


_______________________________________________
Trac mailing list
[email protected]
http://lists.edgewall.com/mailman/listinfo/trac

Reply via email to