> From: Pieter Temmerman [mailto:ptemmerman....@sadiel.es]
> I don't know. It just seemed way to easy to hijack a session, so I
> supposed it must be secure.

Large portions of the web architecture are insecure by their original design.  
This makes security in web-based systems... erm.. "a challenge" :-).

> In my case cookies are created as well.

OK.  So why not rely entirely on the cookie rather than exposing the JSESSIONID 
in the URL at all?  Or (most likely) have I got the wrong end of the stick here?

> By SSL, I suppose you mean client authentication with a certificate?

No, I mean securing the connection by using https: rather than http:.  Entirely 
server-side.  At least that way, someone with a wiretap can't steal your 
session IDs off the wire.  There's still a long way to go before you can 
prevent a different person using a different client from using a session ID 
that they happen to have obtained via (say) an eavesdropping plug-in on the 
user's browser, but it's a good start.

Something to think about: No security will be 100%, not least because there are 
users involved and they're really remarkably good at leaving massive security 
holes in any technological solution - emailing their password to a colleague's 
Hotmail account, writing down login details on a Post-It or just leaving their 
computer unlocked as they nip to the loo.  What security is "good enough" for 
your application?

                - Peter

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to