Here is the actual procedure (in TRUNK, but last modified 3 months ago, I
did not look at what changed).
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_crypto.c?view=markup
Ignoring the apache-specific configuration, it looks pretty standard to me
(although I did not spend too long looking at it, but I did teach
college-senior crypto last semester and it looks similar to a project we
assigned).

- Y

On Mon, Jul 8, 2013 at 11:32 PM, Mikhail T. <mi+t...@aldan.algebra.com>wrote:

>  08.07.2013 19:35, Graham Leggett wrote:
>
> Like Daniel said, you don't need to know.
>
>  This is unhelpful. Do you *know* the answer? If you do, could you share
> it? If you are trying to avoid committing to a particular method -- because
> you foresee it changing in the future -- well, that does not seem right
> either. The cookies may already be stored by the browsers and invalidating
> them all by upgrading the server would not be proper.
>
>  You can configure the decrypted session to be provided to php either via an 
> environment variable or a request header, your choice. You can then 
> optionally update the session with a response header. All encryption is 
> transparent to php.
>
>  Only if the php is running on the same -- or similarly configured Apache
> server.
>
> And then there is the other aspect I mentioned -- the tests, which would
> require the session-cookie to be generated (correctly) inside JMeter.
>
>
> 08.07.2013 19:33, Daniel Lescohier wrote:
>
> Perhaps your decryption code isn't handling the salt?
>
> Perhaps... But for now I'm just trying to decrypt the existing cookie
> myself -- if only to better understand, how it is constructed. I'd
> appreciate the description of the method used -- rather than a lecture on
> how I "don't need to worry my pretty little head"...
>
> I'm also curious, if the cookie is only encrypted, or if it is also
> signed. As well as whether it is possible to just have it signed without
> encrypting... Thanks,
>
> -mi
>
>

Reply via email to