Roel,

On 11/24/15 9:44 AM, Roel Storms wrote:
> I am trying to protect the client from:
> 
> Session fixation

Tomcat already provides session-fixation protection when using URL-based
or cookie-based session-tracking. When authentication occurs, Tomcat
will change the session identifier, effectively mitigating session fixation.

> Session hijacking

I'm interested in your plan for this that (a) is transparent to the
application, (b) is easy to implement on the server and (c) does not
require any changes to the client.

> Assure that requests that are received in an established session can't be
> modified in transit (integrity of requests).

Without TLS or trusted code running on the client, I don't see a viable
solution.

> Maybe I also want to check integrity of the response since otherwise an
> active MitM attack can still modify this.

If you have solved the client -> server integrity, then server -> client
integrity ought to be trivial.

> An attack could consists of an attacker modifying the action
> attribute of a form to send login data to the attacker instead of the
> web application.

A reasonable attack scenario, especially with the attacker has a MitM
position.

> But this again looks a lot like TLS with DH_anon.

It does? Or do you mean even if TLS is used with anon-auth (i.e. ZERO
auth), the client isn't protected from MitM?

> Al we want is to replace the current session mechanism
> where the ID is a bearer token by a mechanism based on a shared secret
> (shared via DH).

How is this different from "standard" TLS-sessions (formal TLS sessions,
not Tomcat's session ids in cookies transmitted via TLS)?

> This will inhibit script based attacks that steal the SID
> and also eavesdropping attacks. It's not perfect but we also believe that
> if you have an active MitM, you have bigger problems than securing your
> session management.

Of course. That doesn't make it an interesting scenario, though.

> The perfect solution is still something including SSL/TLS (it's not 
> cookie based since even over SSL cookies can be leaked if not set
> properly and we don't want a configuration mistake to become a
> security issue).

Configuration mistakes can always result in vulnerabilities. The only
way to fail-safe would be to disallow all "unsafe" configurations, which
would make the software *quite* unusable.

> I am not trying to protect from:
> 
> An active MitM attack during session establishment
> Malware at either client or server-side

-chris

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to