Just a word about associating a given session to one IP address, it
works alright and sure is a security enhancement - not sure though if
there are built-in support for that in tomcat though it can be
implemented at application layer. The major drawback of doing so
depends of your user's ISP IPs management i.e. some will change IP
addresses quite frequently thus causing them to loose their session
each time they'll be switched to a different IP. One would also have
to think of network's artefacts such as proxies that may be shared by
many users on customer's end - together with your own network
architecture that may also prevent you from retrieving correctly
originating IPs - re latest posts on "request.getRemoteAddr() vs.
request.getHeader("REMOTE_ADDR")"

- Joseph

On Fri, Mar 13, 2009 at 12:18 PM, Peter Crowther
<peter.crowt...@melandra.com> wrote:
>> From: Pieter Temmerman [mailto:ptemmerman....@sadiel.es]
>> I don't know. It just seemed way to easy to hijack a session, so I
>> supposed it must be secure.
>
> Large portions of the web architecture are insecure by their original design. 
>  This makes security in web-based systems... erm.. "a challenge" :-).
>
>> In my case cookies are created as well.
>
> OK.  So why not rely entirely on the cookie rather than exposing the 
> JSESSIONID in the URL at all?  Or (most likely) have I got the wrong end of 
> the stick here?
>
>> By SSL, I suppose you mean client authentication with a certificate?
>
> No, I mean securing the connection by using https: rather than http:.  
> Entirely server-side.  At least that way, someone with a wiretap can't steal 
> your session IDs off the wire.  There's still a long way to go before you can 
> prevent a different person using a different client from using a session ID 
> that they happen to have obtained via (say) an eavesdropping plug-in on the 
> user's browser, but it's a good start.
>
> Something to think about: No security will be 100%, not least because there 
> are users involved and they're really remarkably good at leaving massive 
> security holes in any technological solution - emailing their password to a 
> colleague's Hotmail account, writing down login details on a Post-It or just 
> leaving their computer unlocked as they nip to the loo.  What security is 
> "good enough" for your application?
>
>                - Peter
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to