I wasn't in fact aware of that domain test thingie. So my main worry is no
more.

Thank you guys.

--


Pedro Alberto Pontes

"The_radix" <[EMAIL PROTECTED]> wrote in message
004c01c1f348$2db81c40$3200a8c0@oracle">news:004c01c1f348$2db81c40$3200a8c0@oracle...
> Pedro Pontes wrote:
> > with a SIMPLE "equals" test. So if a user happens to get that crypted
> value
> > of the password (from a temporary file on the server, for example), then
> all
> > the little devil has to do is to create a dummy session user object, or
in
> > your case, array, set its password value to the stolen crypted hash and
> then
> > link freely to any of your pages.
>
>
> well.... simply put? no..
>
> If a user can get the crypted value off your server, AND also figure how
to
> trick the PHP engine into accepting a session cookie that wasn't created
on
> your domain, then that would be either:
> a) you have dangerous and volatile PHP scripts that allow users to perform
> such nasty tricks
> b) your server security should be greatly improved..
>
>
> Jon Haworth wrote:
> > Why are you passing the password around, hashed or not, in the first
> place?
> > Just have a yes/no flag for whether the session is an authenticated user
> or
> > not.
>
> > Is there any particular reason why you'd need to reauthenticate on every
> > page?
>
> yes.. too true.. and simply put.. I could just pass the key or something
> around instead and then in my PHP header that runs on each and every page
> just reload a array with all the details anyway.. instead of passing
around
> the array..
>
> oh and as for "reauthenticating" well that's done because.. well stupid
> really when you think of it.. Unless they breach PHP as mentioned above,
and
> trick the session system, then there is little need to keep auth'ing
them..
>
>
> Haha.. Actually I just looked at my code.. Sorry I was mistaken.. due to
the
> complexity of my site. it doesn't actually "reauth" as such.. instead it
> checks to see the "status" of the user and does some log updates.. (to
keep
> track of user's still online etc..) ... when I say status.. I mean if I
> ban/block users while logged in.. the changes happen AS SOON as they view
> another page on the site and they get a lovely page telling them of their
> predicament :)
>
>
>
> Anywayz.. very interesting topic.. I will keep an eye on this..
>
>
> Miguel says:
> > This would only work if some other user is able to create files that the
> > web server thinks are part of your domain (since the session cookies are
> > domain-specific). Sounds to me like your problem here is severe server
> > misconfiguration. If your server environment is that insecure, then
> > worrying about anything else is sort of a waste of time.
>
> Yes.. Too true..
>
>
> Michael Kismal says:
> > What I can't figure out is why you're allowing people to just randomly
> > put pages on your server.  If someone was to randomly register a similar
> > user object, etc - why bother?  If I can put pages on your server and
> > execute them, I'd do some something far more malicious than just pretend
> > I'm "user X".
>
>
> Precisely what I am getting at too..
>
>
> Yes the general opinion seems to be: "If someone can get the session
handler
> of the PHP engine tricked so easily, or gain access so easily to your
> site... Then you'd better look into that WAY before you start picking on
> authentication schemes"..
>
>
> No harm intended ok.. Just pointing out some facts..
>
>
> Hope I can help.. Would love to demonstate some ideas/etc.. about how I do
> security stuff..
>
>
>
> Bye
> :::::::::::::::::::::::::::::::::::::::::::
> :  Julien Bonastre [The-Spectrum.org CEO]
> :  A.K.A. The_RadiX
> :  [EMAIL PROTECTED]
> :  ABN: 64 235 749 494
> :  QUT Student :: 04475739
> :::::::::::::::::::::::::::::::::::::::::::
> ----- Original Message -----
> From: "Pedro Pontes" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Saturday, May 04, 2002 12:33 AM
> Subject: Re: [PHP] Secure user authentication
>
>
> > First of all, thank you for your devote answer.
> >
> > The method I was thinking about before was to pass the md5 hash of the
> > password around, as the passwords are already md5'ed in the DB. Your
> method
> > seems more secure as you use a totally spiced-up and personalized
> encryption
> > engine.
> >
> > But, the main question remains, I think. If you pass your crypted
password
> > around, then, in each page, you must check it agains't the database
entry
> > with a SIMPLE "equals" test. So if a user happens to get that crypted
> value
> > of the password (from a temporary file on the server, for example), then
> all
> > the little devil has to do is to create a dummy session user object, or
in
> > your case, array, set its password value to the stolen crypted hash and
> then
> > link freely to any of your pages.
> >
> > Am I right? Thanks again.
> >
> > --
> >
> >
> > Pedro Alberto Pontes
> >
> > "The_radix" <[EMAIL PROTECTED]> wrote in message
> > 003601c1f2aa$6120dbb0$f86086cb@oracle">news:003601c1f2aa$6120dbb0$f86086cb@oracle...
> > > Hmm yes good question..
> > >
> > > Security was (still is) a major for my organisation's site and I did
> > > something a little unique and robust..
> > >
> > >
> > > I love programming and I hate "stealing" (some call it borrowing)
other
> > > programmer's scripts/code from the web.. therefore I write it _all_
> > myself..
> > >
> > >
> > > Trust me.. Sometimes this is a dumb attitude to take such as when I
> > created
> > > my first Perl discussion forum.. still running I think
> > > (http://the-radix.hypermart.net i think) and that consisted of this
huge
> > > perl system to maintain the files etc.. for members and the forum..
> > >
> > >
> > > Anyway! off the sub now..
> > >
> > >
> > > I used sessions and pass around the array of columns for that
> member/user
> > ..
> > > but the password is put through my own fairly unbreakable (yes.. I am
> > > serious) password key system..
> > >
> > >
> > > An idea to make your own safe keys to pass them around or use for
> > > authenticating is simple maths and a crypt() or my preferred: md5()
> > > function..
> > >
> > >
> > > I simply do some lovely maths like for each char of pword I loop
through
> > > them and append them onto the entire pword string plus the length, get
> the
> > > md5 of that.. then md5 that md5 with the md5 of the previous result
and
> > then
> > > do some maths, pick some specified characters (like every 3rd or
> whatever
> > > you wish) .. strrev( reverse the string) md5 that again, all md5'ed
> > again..
> > >
> > >
> > > :) haha, you get the idea..
> > >
> > >
> > > SO basically you'll end up with a nice 32 char string which is QUITE
> safe
> > to
> > > pass around and the chance anyone's gonna decrypt it IMHO is about
> zilch,
> > > buckley's, zut, nil, null, zero..
> > >
> > >
> > > And all you have to do, is when they login once, just run the password
> > they
> > > entered through this "algorithm" and check it against the stored
algo'd
> > > password..
> > >
> > > Ah yes that's the next thing.. the DB passwords will also have to be
> proc.
> > > using your algorithm..
> > >
> > > So it's kinda like a key security idea.. you are not meant to decrypt
> md5
> > > hashes.. instead recreate it using what you are supplied and then
> compare
> > > both hashes..
> > >
> > >
> > > Simple :P
> > >
> > >
> > >
> > >
> > > Ok hope that helps
> > >
> > > :::::::::::::::::::::::::::::::::::::::::::
> > > :  Julien Bonastre [The-Spectrum.org CEO]
> > > :  A.K.A. The_RadiX
> > > :  [EMAIL PROTECTED]
> > > :  ABN: 64 235 749 494
> > > :  QUT Student :: 04475739
> > > :::::::::::::::::::::::::::::::::::::::::::
> > > ----- Original Message -----
> > > From: "Pedro Pontes" <[EMAIL PROTECTED]>
> > > To: <[EMAIL PROTECTED]>
> > > Sent: Friday, May 03, 2002 10:19 PM
> > > Subject: [PHP] Secure user authentication
> > >
> > >
> > > > Hello,
> > > >
> > > > I'm using the regular user authentication method, that is, check the
> > > > specified login/pass agains't the entries in the DB, if it is valid,
> > > create
> > > > the user object and register it with the section.
> > > >
> > > > How can we prevent any user from creating a simple PHP page that
> creates
> > a
> > > > simmilar user object, registers it with the session and then links
to
> my
> > > > pages? One way would be to check, in each page, for the password in
> the
> > > > session user object and match it with the DB entry, but storing the
> > > password
> > > > in the session is not advisable, as other users in the host system
may
> > > have
> > > > access to that information.
> > > >
> > > > Please advise.
> > > >
> > > > Thank you ver much for your time.
> > > >
> > > > --
> > > >
> > > >
> > > > Pedro Alberto Pontes
> > > >
> > > >
> > > >
> > > > --
> > > > PHP General Mailing List (http://www.php.net/)
> > > > To unsubscribe, visit: http://www.php.net/unsub.php
> > > >
> > >
> >
> >
> >
> > --
> > PHP General Mailing List (http://www.php.net/)
> > To unsubscribe, visit: http://www.php.net/unsub.php
> >
>



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to