Justin S: "If you don't want to have sessions, show us a pattern that can fill 
the void." 
Kyrre K: "...implement it either as a plug-in, code templates, or document it 
as the recommended way." 

I think the documentational path is the first approach, and I don't know that 
the discuss list is the best way to do it, though I think the discussion has 
gotten a lot more light than heat, and I'm grateful for that. I'm thinking more 
along the lines of getting a starting point out on the wiki somewhere, that 
gets called from the FAQ: "My application relies on HttpSessions and Restlet 
doesn't seem to have them. So what am I supposed to do instead?" 

I'm working on an outline based on the input here thus far ... 

- R 

----- Original Message ----- 
From: "Stanczak Group" <[EMAIL PROTECTED]> 
To: discuss@restlet.tigris.org 
Sent: Friday, September 7, 2007 5:58:30 PM (GMT-0500) America/New_York 
Subject: Re: sessions debate (was Re: some benchmarking) 

Yes, this was my point as well. But I think the question began more like 
"If Restlet's doesn't offer something like Sessions someone will make 
one of another framework will take it's place.". My answer was wouldn't 
simple documenting a different method under Restlet's cover that issue. 
I mean if you can still fill the session gap (so to speak) using a 
different method the why would Restlet's need to mimic another systems 
session method? 

Adam Taft wrote: 
> 
> I guess I was reading the question as more like: "Are sessions 
> secure?" or "Are cookies secure?" Not so much "is any generic 
> technology secure?" 
> 
> My answer to the sessions/cookies question: 
> 
> Cookies and/or sessions cannot ever be secure without SSL. Otherwise, 
> a man-in-the-middle can use the cookies (or other session information) 
> to easily spoof the identity of the user. 
> 
> :) 
> 
> Adam 
> 
> 
> John D. Mitchell wrote: 
>> Re: Security 
>> 
>> The underlying issue is always the need to answer the question: 
>> What is the threat model that you're worried about? 
>> Until there's clarity on that, all other considerations are irrelevant. 
>> 
>> After there's clarity on that then it's a question of balancing the 
>> tradeoffs (direct costs, user impact, unintended consequences, etc.). 
>> One of the key "when do we know where to stop" criteria is the point 
>> at which for any given threat vector when does it become 
>> cheaper/easier/etc. to just go 
>> trick/bribe/bully/break-in-and-steal/etc. the information rather than 
>> trying to get it technologically -- i.e., the "rubber-hose" test. 
>> 
>> Take care, 
>> John 
> 

-- 
Justin Stanczak 
Stanczak Group 
812-735-3600 

"All that is necessary for the triumph of evil is that good men do nothing." 
Edmund Burke 

Reply via email to