The other wrinkle is that even if the developer moves the session to SSL,
they might forget to mark the cookie secure.  So when the user goes to their
old http:// bookmark they might still leak out their session cookie and
be vulnerable to session-jacking.

-nage

On Thu, Nov 4, 2010 at 2:12 PM, Merrill Oveson <move...@gmail.com> wrote:

> Does it only involve wireless traffic?
>
> On Thu, Nov 4, 2010 at 1:09 PM, Charles Curley
> <charlescur...@charlescurley.com> wrote:
> > I haven't seen any discussion of FireSheep here.
> >
> >
> http://www.charlescurley.com/blog/archives/2010/11/04/bringing_in_the_sheep/index.html
> >
> > --
> >
> > Charles Curley                  /"\    ASCII Ribbon Campaign
> > Looking for fine software       \ /    Respect for open standards
> > and/or writing?                  X     No HTML/RTF in email
> > http://www.charlescurley.com    / \    No M$ Word docs in email
> >
> > Key fingerprint = CE5C 6645 A45A 64E4 94C0  809C FFF6 4C48 4ECD DFDB
> >
> > /*
> > PLUG: http://plug.org, #utah on irc.freenode.net
> > Unsubscribe: http://plug.org/mailman/options/plug
> > Don't fear the penguin.
> > */
> >
>
> /*
> PLUG: http://plug.org, #utah on irc.freenode.net
> Unsubscribe: http://plug.org/mailman/options/plug
> Don't fear the penguin.
> */
>

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to