Well, I'm afraid all the solutions you gave, though seem reasonable,
won't solve the scenerio I talked about. The problem is with the face
the session won't change on login (so I can just get into the website,
before someone else does, copy the session data, and then wait for him
to log in).


On Nov 13, 1:38 am, mdipierro <[email protected]> wrote:
> There are two things you can do.
>
> 1) session.secure() # will force session over https
> 2) call auth.logout() to delete all auth information from the session
> (this will not change the session cookie)
> 3)
> auth.settings.logout_onlogout=lambda user:
> os.unlink(response.session_filename)
>
> This will delete the session and will force a new session cookie next
> request.
>
> On Nov 12, 4:42 pm, guruyaya <[email protected]> wrote:
>
> > I've inspected web2py cookies, and I think I'm on to a problem.
> > Say, I'm going into a public internet cafe. I'm getting into a web2py
> > websute, that use the default auth. I'm looking at the cookie data,
> > saving it
> > then, I'm sitting in the next chair, and some other guy goes to the
> > same website, and logs in. At this point - the cookie didn't change.
> > And as we're both behind firewall, we also have the same IP,so I can
> > easly implant the logged in session, into my browser, and do horrible,
> > and unspeakable things on his behalf.
> > Is there a way to force new session, once a use is logged in? This
> > way, I can be sure no cookie is stolen.
>
> > Yair
>
>

Reply via email to