On 27 September 2013 12:12, Leigh <lei...@gmail.com> wrote:

> On 26 September 2013 11:32, Tjerk Meesters <tjerk.meest...@gmail.com>
> wrote:
> >
> > On Thu, Sep 26, 2013 at 6:19 PM, Leigh <lei...@gmail.com> wrote:
> >>
> >> There's several scenarios where a users IP changes and you don't want to
> >> drop their session. (That doesn't mean it should simply have an option
> to
> >> disable it either)
> >
> >
> > Let's be clear here: this won't happen (in most cases), because the
> client
> > will simply get a new cookie and the session will keep working; it's like
> > what you would implement if your user level goes from anonymous to
> logged in
> > and vice versa.
>
> Right, so maybe I misunderstood the intent of this.
>
> I was reading it as: valid SID on new IP = drop session, which to me
> seems like the more "secure" approach.
>
> What you're saying is is when a valid SID is supplied on a new IP, you
> regenerate the SID and the session continues to be valid on the new
> IP?
>
> So on a successful session hijack (correct SID, new IP) the attacker
> gets a new SID and keeps the valid session while the legitimate user
> gets kicked out.
>
> Not seeing how that improves things at all.
>
> --
> PHP Internals - PHP Runtime Development Mailing List
> To unsubscribe, visit: http://www.php.net/unsub.php
>
>
In your scenario, user gets booted and thus knows somethings wrong. Much
better than the attacker hijacking the session without the user knowing
anything at all.

Regards
Peter

-- 
<hype>
WWW: plphp.dk / plind.dk
CV: careers.stackoverflow.com/peterlind
LinkedIn: plind
Twitter: kafe15
</hype>

Reply via email to