> From: Pieter Temmerman [mailto:ptemmerman....@sadiel.es] > I don't know. It just seemed way to easy to hijack a session, so I > supposed it must be secure.
Large portions of the web architecture are insecure by their original design. This makes security in web-based systems... erm.. "a challenge" :-). > In my case cookies are created as well. OK. So why not rely entirely on the cookie rather than exposing the JSESSIONID in the URL at all? Or (most likely) have I got the wrong end of the stick here? > By SSL, I suppose you mean client authentication with a certificate? No, I mean securing the connection by using https: rather than http:. Entirely server-side. At least that way, someone with a wiretap can't steal your session IDs off the wire. There's still a long way to go before you can prevent a different person using a different client from using a session ID that they happen to have obtained via (say) an eavesdropping plug-in on the user's browser, but it's a good start. Something to think about: No security will be 100%, not least because there are users involved and they're really remarkably good at leaving massive security holes in any technological solution - emailing their password to a colleague's Hotmail account, writing down login details on a Post-It or just leaving their computer unlocked as they nip to the loo. What security is "good enough" for your application? - Peter --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org