I meant to write:

Yes. If you use HTTP cleartext transport instead of HHTPS, then a packet sniffer can grab the cookie. But the normal hijack route is by copying and pasting URLs into an email that gets passed around.

So one thing I do is only allow one concurrent login (IP address) per userrefernce. This limits the problem to nefarious co-workers in the same NATed subnet, ie., they present the same public IP address to my server. (But if you can't trust your co-worker, she's on the management track and will be your boss someday). I The downside is that some users close their window mistakenly without logging out, and then they can't login again until the previous session times out. But we allow them to check a box to force their old session to expire.

On Jun 8, 2006, at 5:10 PM, William M Conlon wrote:

Yes, if you use HTTP cleartext transport, you can use a packet sniffer and grab the cookie. But the normal hijack route is by copying and pasting URLs into an email that gets passed around.

So one thing I do is only allow one concurrent login (IP address) per userrefernce. This limits the problem nefarious to co-workers in the same NETed subnet The downside is that some users close their window mistakenly without logging out, and then they can't login again until the previous session times out. But we allow them to check a box to force their old session to expire.

On Jun 8, 2006, at 4:57 PM, Alan Wolfe wrote:

Could someone spoof a cookie's value just like someone could spoof a user ref argument to do session hijacking?


On 6/8/06, Robert Garcia <[EMAIL PROTECTED]> wrote:
Yes, but that doesn't solve any of the issues that arise from using it in a url, you have the same issues, when you don't just use the cookie methods.



--


Robert Garcia
President - BigHead Technology
VP Application Development - eventpix.com
13653 West Park Dr
Magalia, Ca 95954
ph: 530.645.4040 x222 fax: 530.645.4040
[EMAIL PROTECTED] - [EMAIL PROTECTED]
http://bighead.net/ - http://eventpix.com/

On Jun 8, 2006, at 4:48 AM, Dale Graham wrote:

You can also pass UserReferenceArgument as a hidden argument, which drops it out of the URL...


I believe it must be in this form <input type="hidden" name="_userReference" value="<@UserReferenceArgument>">


If I am in error on the format, someone on the list more knowledgeable can correct this .....

On Jun 7, 2006, at 12:09 PM, GEzra wrote:

Folks I'm dealing with do not like cookies, candies or anything sweet - spent a lot of time making sure that I was passing userref in the url to avoid cookies. I'm just gonna see if my isp can do something about their router, unless my xserve is doing this NAT, even though its turned off.


Thanks for your help on this Dave, William & Robert!


Ezra




On 2-Jun-06, at 4:23 AM, Robert Garcia wrote:


Yes, they are in the URI, you can see in the log:


_function=validate_user&_UserReference=58FA321F03B02D3E447F5B62


Remove userreference from URI, and only use cookies.


--
Robert Garcia
President - BigHead Technology
VP Application Development - eventpix.com
13653 West Park Dr
Magalia, Ca 95954
ph: 530.645.4040 x222 fax: 530.645.4040
[EMAIL PROTECTED] - [EMAIL PROTECTED]
http://bighead.net/ - http://eventpix.com/


On Jun 1, 2006, at 8:35 PM, William M Conlon wrote:


Are the userref's in the URI? That would allow them to be shared.


Look in the archive on session hijacking.




On Jun 1, 2006, at 7:37 PM, GEzra wrote:


Hello all!


I looked at my witango log today and it seems like the same userreference was assigned to two different users, seconds apart while both were accessing diff. apps.


What's so odd is that the server address of xxx.xxx.xxx.xxx is being logged as the clients ip. How can this be?




01/06/2006 14:27:19 xxx.xxx.xxx.xxx [EMAIL PROTECTED] 25272320 1 1 [Application File] START /apps/login.taf WitangoServer _function=validate_user&_UserReference=58FA321F03B02D3E447F5B62 01/06/2006 14:27:44 xxx.xxx.xxx.xxx [EMAIL PROTECTED] 25310208 1 0 [Application File] START /apps/login.taf WitangoServer _function=validate_user&_UserReference=58FA321F03B02D3E447F5B62




Any ideas?


thanks,
Ezra
________________________________________________________________ ________ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/ maillist.taf


Bill


William M. Conlon, P.E., Ph.D.
To the Point
345 California Avenue Suite 2
Palo Alto, CA 94306
   vox:  650.327.2175 (direct)
   fax:  650.329.8335
mobile:  650.906.9929
e-mail:  mailto:[EMAIL PROTECTED]
   web:  http://www.tothept.com


_________________________________________________________________ _______ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/ maillist.taf


__________________________________________________________________ ______ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/ maillist.taf


___________________________________________________________________ _____
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf




____________________________________________________________________ ____ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/ maillist.taf

_____________________________________________________________________ ___ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/ maillist.taf

_____________________________________________________________________ ___ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/ maillist.taf

Bill

William M. Conlon, P.E., Ph.D.
To the Point
345 California Avenue Suite 2
Palo Alto, CA 94306
   vox:  650.327.2175 (direct)
   fax:  650.329.8335
mobile:  650.906.9929
e-mail:  mailto:[EMAIL PROTECTED]
   web:  http://www.tothept.com

______________________________________________________________________ __
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

Bill

William M. Conlon, P.E., Ph.D.
To the Point
345 California Avenue Suite 2
Palo Alto, CA 94306
   vox:  650.327.2175 (direct)
   fax:  650.329.8335
mobile:  650.906.9929
e-mail:  mailto:[EMAIL PROTECTED]
   web:  http://www.tothept.com

________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

Reply via email to