>> Well, more worrisome would be if a bad guy tricks you into clicking on
>> a link or simply sends you an image in an email that makes a request
>> to my server with a valid-looking session id.  Then if you go to this
>> site (that
>
>     I've debunked that scenario already a few times.  The net
>     result is that this class of attacks is impossible to
>     prevent.
>
>     The assumption in your scenario and the following is this:
>
>     The attacker has access to a script X which calls
>     session_start().
>
>     My scenario:
>
>     1.) Attacker A accesses X and stores the SID which PHP assigns to
> him.
>
>     2.) A crafts a link containing SID and sends it to victim V.
>
>     3.) A keeps SID alive by repeatedly accessing X using SID.
>
>     4.) V opens link and authenticates.
>
>     5.) A's script notices (4).  A can overtake V's session.

Ive extended the session handling so that upon session start, it takes a
snapshot of the browser string (and maybe a couple of other
javascript-retrieved variables about the user's os, eg: the resolution)
and build up as much of a picture of the client as possible.

Then store this with the session id, and each time its loaded, check that
the system hasnt changed. Ive found that (although all the data can be
faked) that the browser string alone causes alot of grief - especially as
IE's browser string is changed by many plugin programs.

Just a thought.


-- 
Dan Hardiker [[EMAIL PROTECTED]]
ADAM Software & Systems Engineer
First Creative Ltd



-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to