DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=35709>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=35709 [EMAIL PROTECTED] changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[EMAIL PROTECTED] Status|RESOLVED |REOPENED Resolution|WONTFIX | ------- Additional Comments From [EMAIL PROTECTED] 2005-07-18 16:12 ------- I am re-opening this because I guess there may be multiple misunderstandings and that these misunderstandings may be part of the decision to invalidate this bug. Remy: 1) "As for your issue, did you notice 3rd party cookies are allowed by default in browsers ?" This is IMHO unrelated to this issue. 3rd party cookies do NOT represent a security risk per se and cannot interfere with session logic. Nothing new. A page can have only one domain. a single script cannot be read cookies across domains unless the browser is broken. Content in a web page from multiple domains != cross site scripting vulnerability. 2) "You seem to have a bit too much time on your hands." This comment suggests that resources play an important role in judging the validity of the request. I would suggest that the resource question is deferred until later i.e. considered when this is due after evaluation, i.e. in a cooperative fashion compatible with the structure of this project. Voting after evaluation comes to mind. 3) "There are gaping holes in session security (without SSL), it's not worth trying to patch the existing model." a) If these holes are in Tomcat then they need to be fixed. Please supply bug numbers in that case. b) If you refer to the insecurity of the general architecture of session management with HTTP as it stands, then this would be even more a reason to have tomcat provide intrinsic security and give better support to struggling programmers. Tomcat is there to provide advanced frameworks that free programmers from hand coding these mechanisms. 4) "As I said, sorry, but I am not interested at all in this functionality, which would interest very few people, and yet introduce inefficient mechanisms and lots of complexity. If you have special needs, that's ok, but you're on your own." a) It is regarded unprofessional in a cooperative environment such as this to let an overriding personal interest get in the way of making balanced decisions. This behavior is sometimes called "corrupt" although I am not saying that you are necessarily corrupt. b) It is always considered worthwhile to plug a significant security hole in exchange for a minimal, sometimes major modification. "inefficient mechanisms and lots of complexity" - maybe - but likewise may be not in this case. One has to think it through first. c) "special needs". Ralf's needs are not special, they are quite generic. They can be condensed into the ubiquitous requirement to have a strictly limited single file download session within a major browsing session. It is a high priority business requirement to ensure that such sessions are not re-used by third parties. In a summary, it appears that there is an overwhelming number of reasons to finally start evaluating this request for enhancement. I would also suggest a less confrontational approach. -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]