So you wish to prevent your users from forging GET/POST values and are
willing to rely on client-side cookies ?
How is that any safer ?
On Tue, 2002-08-20 at 09:18, Marko Karppinen wrote:
Sascha:
> If you want your site to be safe, enable
> session.use_only_cookies and be done with it. No amount of
> checking on the server side can otherwise prevent this class
> of attacks.
By the way, does session.use_only_cookies work with
session.use_cookies=off?
I'm using an alternative method (HTTP Basic Authentication) for the
session
id propagation, and would like to prevent users from setting the sid in
get/post
parameters.
mk
--
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php
Xavier Spriet
Developer/Administrator/Apache Build
Next Dimension Inc.
[EMAIL PROTECTED]
Tel: (519)-945-2032 Ext. 233