The rationale for securing the cookies (ie only send them when a https
connection is used) is that if your cookies are not protected you are
vulnarable to cookie hijacking.

See for example:
http://fscked.org/blog/fully-automated-active-https-cookie-hijacking

Perhaps you can override the cookie service? or create a 'copy' of the
JSESSIONID cookie in your login page but this time unprotected?

Martijn Brinkers

On Wed, 2008-12-17 at 11:42 -0600, Keith Bottner wrote:
> I am having a small problem with JSESSIONID cookie having its secure  
> property set to TRUE when you initially connect. We have a login page  
> that is displayed first and uses SSL. After login only certain parts  
> of the web site use SSL. However, since initial connection to the web  
> server was with SSL and it creates a JSESSIONID cookie for the initial  
> connection, it reads the page as secure and therefore sets the secure  
> bit. This is a problem because the JSESSIONID cookie is then not  
> passed back in subsequent requests to the server for non SSL pages  
> which means the user is not tied back to their session appropriately.
> 
> Anyone have any ideas on how JSESSIONID can be forced to NOT be secure  
> regardless of the Request.isSecure() result?
> 
> Thanks in advance,
> 
> Keith
> 
> 
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
> For additional commands, e-mail: users-h...@tapestry.apache.org
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
For additional commands, e-mail: users-h...@tapestry.apache.org

Reply via email to