Thank You Mark

On Wed, Nov 25, 2015 at 4:39 PM, Mark Thomas <ma...@apache.org> wrote:

> On 25/11/2015 10:50, Utkarsh Dave wrote:
> > Hello,
> >
> > I need inputs/answers on below points to implement a secure session
> > management application
> > Or if there is there any configuration that may need to be tuned to
> improve
> > below please point me to that
> > A)
> > Are Session IDs cryptographically strong and do not reveal sensitive
> > information so that they can't be guessed easily or used to find attack
> > vectors.
> > Does we meet below
> > 1. Does Strong entropy sources being used to generate the session ID
> value
>
> Yes, it uses java.security.SecureRandom by default.
>
> > 2. Does Strong cryptographic algorithms being used to generate the
> session
> > ID value
>
> Yes, SHA1PRNG by default.
>
> > 3. Does the session ID value provides at least 128 bits of entropy.
>
> Yes, the session ID is 16 bytes / 128 bits long by default.
>
> > 4. Is the session ID value meaningless to prevent information disclosure
> > attacks, allowing recovery of the contents of the ID and extract details
> of
> > the user, the session, or the inner workings of the web application.
>
> Yes.
>
> > B)
> > Are the Session IDs fully validated before they may be used.
> > When using session ID to keep authentication state and track user
> progress
> > within a web application, the application MUST treat the session ID as
> > untrusted data,
> > and sanitize and validate it before use.
>
> Yes.
>
> As with most things in Tomcat, configuration provides a lot of control
> over session ID generation but the default settings meet the
> requirements you set out above.
>
> Mark
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to