On 26 September 2013 11:32, Tjerk Meesters <tjerk.meest...@gmail.com> wrote:
>
> On Thu, Sep 26, 2013 at 6:19 PM, Leigh <lei...@gmail.com> wrote:
>>
>> There's several scenarios where a users IP changes and you don't want to
>> drop their session. (That doesn't mean it should simply have an option to
>> disable it either)
>
>
> Let's be clear here: this won't happen (in most cases), because the client
> will simply get a new cookie and the session will keep working; it's like
> what you would implement if your user level goes from anonymous to logged in
> and vice versa.

Right, so maybe I misunderstood the intent of this.

I was reading it as: valid SID on new IP = drop session, which to me
seems like the more "secure" approach.

What you're saying is is when a valid SID is supplied on a new IP, you
regenerate the SID and the session continues to be valid on the new
IP?

So on a successful session hijack (correct SID, new IP) the attacker
gets a new SID and keeps the valid session while the legitimate user
gets kicked out.

Not seeing how that improves things at all.

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to