So  security  is fake in large NATted networks?

2010/11/25 Niphlod <[email protected]>:
> still there are no counter-indication....
> a session sticks to one single ip.
> users of LAN (me and my brother) "hidden" by NAT, users of large WANs
> like Fastweb in Italy (and quite everyone in China, I believe) show
> themself to the webserver with the same IP address in the same
> session.
> As long as web2py don't bother if two different users have the same
> IP, checking that the session cookie "comes" from the same address is
> safer than the actual implementation and doesn't break anything.
> I don't know if China's ISP and other privacy softwares, like Tor, can
> change the IP address over a session.... in that case this
> implementation will break things.
> Still, I think that if the default "check" of "remember me 30 days"
> saves the cookie for 30 days, probably I'll get to insert username and
> password at least every day.... here in Italy if you turn down the
> connection (or the router), you get a different IP address.
> For me it's not a problem, but probably some people think differently.
>
> Niphlod
>
>
> On 25 Nov, 17:55, Kuba Kucharski <[email protected]> wrote:
>> @massimo
>>
>> this sounds good, although stealing creditentials/intercepting
>> communication is most probable in the networks hidden over NAT - hence
>> in this case it will not work.
>>
>> --
>> Kuba

Reply via email to