On 8/10/06, uselpa <[EMAIL PROTECTED]> wrote:
>
>
> spacedman wrote:
> > /foo/bar/info?session_id=0873556323
> >
> > BUT if anyone gets that URL they get that person's session. Which is a
> > BAD thing. So don't do that.
>
> Unless you check that the IP from which the request is coming is the
> same IP from which the initial request came.

Unless they're behind some type of NATing of course...

It is best is to ensure that any non-cookie based sessions are
temporary and timeout promptly. Realise as well that anyone who can
get your URL either has access to your machine or is sniffing your
network traffic which would also mean that they could get your cookie
information.

If you're tracking sessions for personalisation reasons then both
methods are fine. As soon as sensitive information is being tied to a
session (card details etc) then a new session id should be generated
and only passed over encrypted channels. This session should be
destroyed as soon as possible and not used for accessing unencrypted
pages.

IP checking and other such methods can work (intranets would probably
be the best environment) but can break and lead to annoyed users. I
personally would recommend concentrating on a solid application design
which minimised the exposure of sensitive information.

Just my £0.02 (which I suppose is almost $0.04 these days ;-)

Felix

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-users
-~----------~----~----~----~------~----~------~--~---

Reply via email to