> Edin Kadribasic wrote:
> >
> > > I absolutely agree with Stefan here. It is *not* PHP's job to
> > secure
> > > a connection. SSL does this.
> >
> > Like that's going to stop users from pasting url with SID in it to
> > an email, which is what this thread is about.
> >
> > Edin
>
> The issue is also that anyone can provide an URL wich can force  the
> creation of  any user-provided ID and, at_the_same_time, force the use
> of URL propagation instead of cookie propagation, on ANY cookie-enabled
> client.
>
> It is unconceivable that any user is given trust in supplying his
> 'unpredictable' session ID. At the moment only the (forthcoming?)
> session.use_only_cookies php.ini directive can block that.
>
> I know nothing can be secure 100%, but the fact that 'a horse with three
> legs can still walk' is no good reson not to shoot that leg (hey, I love
> horses, but this one is an enemy one...;-)

But any user can just as easily provide his own cookie with the session id
in it.  The simple move from the URL to a Set-Cookie header in the request
does not suddenly make it secure.

-Rasmus


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to