bruce wrote:
hi...

a number of you write apache/web/server apps that deal with secure
information.. in doing some research it occured to me that a potential weak
link is on the client side, regarding the browser? how many of you actually
attempt to verify that the browser being used by the client is indeed a
legitimate (non-hacked) browser??

or is there even a way to do this?

or should i just go back to sleep..??

thanks

-bruce
[EMAIL PROTECTED]

Quite frankly I don't see how you are going to do this. The only thing I know of that might indicate the version / type of browser that is being used is the User Agent string, but it's not hard for this to be forged. So you could very well be dealing with an IE user that has a Mozilla Fire(fox|bird|????) User Agent string.

More to the point: are you concerned that someone is using an unpatched browser that has holes, or are you concerned that someone is using a binary that has been hacked to pieces and rebuilt to look just like a normal browser? Because I really, REALLY don't think there would be a way to test for the second problem. What do you look for? How in the world do you find it?

--
NEW? | http://www.catb.org/~esr/faqs/smart-questions.html
STFA | http://marc.theaimsgroup.com/?l=php-general&w=2
STFM | http://php.net/manual/en/index.php
STFW | http://www.google.com/search?q=php

--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to