> > both the cookie and URL based session passed over without SSL is
> insecure.
> > i'd love to know who told you otherwise.
> 
> I can't remember the exact sites now, but, the issue was about how
much
> easier it is to spoof Sessions when IDs are passed via the URL as
opposed
> to
> being stored in a cookie.

It's easier because you can just type it in rather than "crafting" a
cookie, but it's all pretty much the same. They are both equal, security
wise. 

Well, actually, the other problem with session IDs in the URL is that
user's could mistakenly post a URL somewhere with their session ID. If
someone clicked on this link while the session was active, it could be
hijacked. 

> But going back to the first point, if I'm passing Session IDs via the
URL,
> shouldn't I be doing something more to make the site a little more
secure?
> I
> don't store sensitive data in sessions vars, but, if it allows a non-
> paying
> member to hijack a paying member's session, then this is going to be a
> problem. But I'm not sure what more I can do to make the session a
little
> more secure and less likely that someone will hijack it. SSL is a
little
> overkill for this, as this isn't a bank or financial institution, it's
> just
> a little community website.

You kind of contradict your self. It'll be a problem, but it's just a
little "community website". So is it a problem or not? Honestly, if I
somehow hijacked Joe Blow's session, what could I do? If it is a
problem, then use SSL, plain and simple. That'll protect you from
session IDs being sniffed from a network. 

---John W. Holmes...

Amazon Wishlist: http://www.amazon.com/o/registry/3BEXC84AB3A5E

PHP Architect - A monthly magazine for PHP Professionals. Get your copy
today. http://www.phparch.com/



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to