Re: [PHP] Using Cookies Securely

2003-06-01 Thread Evan Nemerson
Again, "It's not perfect, but I don't think anyone has come up with a better way." It's called session hijacking, and it is a great reason to use SSL. However, there's still the issue of cross-site scripting, which can really only be prevented by smarter coding. Even then there are issues. For

Re: [PHP] Using Cookies Securely

2003-05-31 Thread Dustin Mitchell
On Fri, May 30, 2003 at 11:01:26PM -0700, Evan Nemerson wrote: > Send a session ID to the user in a cookie, then lookup that ID in a database > on the server. It's extremely difficult to guess random session ID's (don't > just increment them!), and if you have a session timeout, you're pretty muc

Re: [PHP] Using Cookies Securely

2003-05-31 Thread Evan Nemerson
Send a session ID to the user in a cookie, then lookup that ID in a database on the server. It's extremely difficult to guess random session ID's (don't just increment them!), and if you have a session timeout, you're pretty much set. It's not perfect, but I don't think anyone has come up with

Re: [PHP] Using Cookies Securely

2003-05-31 Thread Justin French
The short answer is that if you're worried about security, don't store a uid and pwd in a cookie on the client... banks don't do it, for example. It's also common for the uid to be remembered, but not the pwd. >From what I can see happening on the "big sites", you give the user the option to be r

[PHP] Using Cookies Securely

2003-05-31 Thread Monty
I see some posts here that say storing a username or encrypted password in a cookie is not secure. If so, then what's a more secure way to allow users to be "remembered" using a cookie so that they don't have to log in every time they come to the site? What do you store in the cookie to authenticat