RE: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-16 Thread Propes, Barry L
I thought it was for some reason like that and I guess more environments are closing that option off. -Original Message- From: David Rees [mailto:[EMAIL PROTECTED] Sent: Wednesday, August 16, 2006 6:02 PM To: Tomcat Users List Subject: Re: Session hijacking with Tomcat/Myfaces - unable

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-16 Thread David Rees
On 8/16/06, Propes, Barry L <[EMAIL PROTECTED]> wrote: From: Maurice Yarrow [mailto:[EMAIL PROTECTED] Generally, getRemoteHost() and getRemoteAddr() return the same value, but I had found a situation during testing where getRemoteAddr() returned an IP address but getRemoteHost() returned nothing

RE: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-16 Thread Propes, Barry L
o: Tomcat Users List >Subject: Re: Session hijacking with Tomcat/Myfaces - unable to fix it > > >Hello David, Tomas: > >About two months ago, I tried using the getRemoteAddr() for doing IP >check as an addtional auth metric, but found exactly than on local >net, this did not disc

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-12 Thread Maurice Yarrow
tions under which this occurred.) Maurice Yarrow Propes, Barry L wrote: what about getRemoteHost()? -Original Message- From: Maurice Yarrow [mailto:[EMAIL PROTECTED] Sent: Thursday, August 10, 2006 5:30 PM To: Tomcat Users List Subject: Re: Session hijacking with Tomcat/Myfaces - unable t

RE: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-11 Thread Propes, Barry L
mmm, ok. -Original Message- From: David Rees [mailto:[EMAIL PROTECTED] Sent: Friday, August 11, 2006 2:51 PM To: Tomcat Users List Subject: Re: Session hijacking with Tomcat/Myfaces - unable to fix it On 8/11/06, Propes, Barry L <[EMAIL PROTECTED]> wrote: > what about getR

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-11 Thread David Rees
On 8/11/06, Propes, Barry L <[EMAIL PROTECTED]> wrote: what about getRemoteHost()? getRemoteHost is simply a getRemoteAddr with a reverse DNS lookup thrown on top. No additional security there, in fact one could argue that there is less. -Dave -

RE: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-11 Thread Propes, Barry L
what about getRemoteHost()? -Original Message- From: Maurice Yarrow [mailto:[EMAIL PROTECTED] Sent: Thursday, August 10, 2006 5:30 PM To: Tomcat Users List Subject: Re: Session hijacking with Tomcat/Myfaces - unable to fix it Hello David, Tomas: About two months ago, I tried using the

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Darryl Miles
Maurice Yarrow wrote: Thanks for adding this thought. As per my previous note on this subject, in light of your (relative) confidence in using IP, maybe I _should_ reconsider the getRemoteAddr() and simply use it as an addt'l advisory for making session auth decision on successive pages as the

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Darryl Miles
Tomas Hulek wrote: Unfortunately, filters are skipped (ie. not called at all) when form-based login page is processed as a result of client requesting a secure area. We tried that too... By the way, the original URL that the client requested is hidden in the session in a way which prevents the

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Marc Richards
Supposing that your secure area is using a constantly different URL path than your non-secure pages you could create a filter to modify the default path for the jsessionid cookie to be valid only for non-secure pages. For example, if your non-secure site is at http://mysite.com/public/... and you

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Maurice Yarrow
ce-ip)? Another question is can the original request IP be spoofed? Long - Original Message - From: "Tomas Hulek" <[EMAIL PROTECTED]> To: "Tomcat Users List" Sent: Thursday, August 10, 2006 12:06 PM Subject: Re: Session hijacking with Tomcat/Myfaces - unable to

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Maurice Yarrow
Hello David, Tomas: About two months ago, I tried using the getRemoteAddr() for doing IP check as an addtional auth metric, but found exactly than on local net, this did not discriminate in many cases and only a single IP was returned for hosts on LAN. So I decided that there was too much ambigu

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Long
feel reasonably secure if requests for a session are indeed coming from the same IP. Long - Original Message - From: "Tomas Hulek" <[EMAIL PROTECTED]> To: "Tomcat Users List" Sent: Thursday, August 10, 2006 2:53 PM Subject: Re: Session hijacking with Tomcat/Myfaces

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread David Rees
I wonder if associating (and checking) the request IP with the session would reduce the problem to some acceptable level. What is the chance of a session being hijacked from the same network (face-ip)? Another question is can the original request IP be spoofed? In this case the chances are rela

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Tomas Hulek
quest IP be spoofed? Long - Original Message - From: "Tomas Hulek" <[EMAIL PROTECTED]> To: "Tomcat Users List" Sent: Thursday, August 10, 2006 12:06 PM Subject: Re: Session hijacking with Tomcat/Myfaces - unable to fix it > > We have tried it, but the internal s

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Long
- From: "Tomas Hulek" <[EMAIL PROTECTED]> To: "Tomcat Users List" Sent: Thursday, August 10, 2006 12:06 PM Subject: Re: Session hijacking with Tomcat/Myfaces - unable to fix it > > We have tried it, but the internal session attributes where Tomcat stores >

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Tomas Hulek
Unfortunately, filters are skipped (ie. not called at all) when form-based login page is processed as a result of client requesting a secure area. We tried that too... By the way, the original URL that the client requested is hidden in the session in a way which prevents the web app from copying

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Tomas Hulek
We have tried it, but the internal session attributes where Tomcat stores the original request are hidden to application, and are certainly not accessible to javax.servlet.* API (and we do try to write PORTABLE application, relying on the specification and not on the internals of one particular se

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Darryl Miles
Well HTTP Cookies have a solution to this problem. They have a "Secure" keyword in the Set-Cookie line. This stops the client leaking the cookie outside of a secure channel. The problem is I dont think Tomcat keeps track and flags if a session has been exposed via a non-secure channel or

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread David Smith
Right. Tomcat stores the original request info in the session before redirecting to the login page. Invalidate the session and the original request url is gone. You could try (and I haven't tried this) is to find the original request info stored in the old session, pull it out of the old ses

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-10 Thread Mark Thomas
Tomas Hulek wrote: > Any hints how to fix it? Again, do all access to your app under https. Mark - To start a new topic, e-mail: users@tomcat.apache.org To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail:

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-09 Thread Tomas Hulek
Unfortunately, the fundamentally bad security scheme is how the JS API specification is implemented in Tomcat (when using form-based authentication). When processing a form-based authetication request under HTTPS, Tomcat retains the session ID allocated under HTTP. We have tried invalidating the

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-09 Thread Kim Albee
It's a fundamentally bad security scheme to use the session-ID as the identifier for your users. Might be straight forward, but architecturally a bad choice if you *really* want a secure area. Kim :-) On 8/9/06, Tomas Hulek <[EMAIL PROTECTED]> wrote: The default Tomcat installation is prone t

Re: Session hijacking with Tomcat/Myfaces - unable to fix it

2006-08-09 Thread Mark Thomas
Tomas Hulek wrote: > The default Tomcat installation is prone to session hijacking. I would > appreciate help how to fix it. This is a more general http problem with a well known solution. Do everything over https. Mark - To sta