RE: Session stealing with wicket-auth-roles

2009-12-02 Thread Loritsch, Berin C.
I too would like to know the Wicket answer. The problem is that JSESSIONID is how the Servlet container differentiates the session with the user. It's part of the spec since the beginning. Because it is well known and certain browsers (Firefox, representing over a third of browser clients) make

Re: Session stealing with wicket-auth-roles

2009-12-02 Thread nino martinez wael
Cant you use http://www.mkyong.com/wicket/how-do-encrypt-encode-url-in-wicket/ But I guess it might still get the session id appended..? 2009/12/2 Loritsch, Berin C. berin.lorit...@gd-ais.com I too would like to know the Wicket answer. The problem is that JSESSIONID is how the Servlet

Re: Session stealing with wicket-auth-roles

2009-12-02 Thread James Carman
This is not a Wicket issue. However, there is a good discussion on the topic here: http://old.nabble.com/JSESSIONID-hijacking-td22492701.html What application server are you using? On Wed, Dec 2, 2009 at 4:24 AM, Andrew Turner grim_toas...@hotmail.com wrote: Good morning all, I'm hoping

Re: Session stealing with wicket-auth-roles

2009-12-02 Thread James Carman
The Seam folks have a fix for removing JSESSIONID from the URLs, too: http://seamframework.org/Documentation/RemovingJSESSIONIDFromYourURLsAndFixingScache On Wed, Dec 2, 2009 at 9:31 AM, James Carman jcar...@carmanconsulting.com wrote: This is not a Wicket issue.  However, there is a good

Re: Session stealing with wicket-auth-roles

2009-12-02 Thread Erik van Oosten
Thats basically the same code as on http://randomcoder.com/articles/jsessionid-considered-harmful. OWASP also has a good deal to say about sessions: http://www.owasp.org/index.php/Session_Management Regards, Erik. James Carman wrote: The Seam folks have a fix for removing JSESSIONID

Re: Session stealing with wicket-auth-roles

2009-12-02 Thread Marat Radchenko
2009/12/2 Andrew Turner grim_toas...@hotmail.com: Good morning all, I'm hoping I've misconfigured something in my application, but we seem to be prone to session stealing in our wicket application.  We're using wicket-auth-roles to provide the security, and if you are able to access the

RE: Session stealing with wicket-auth-roles

2009-12-02 Thread Andrew Turner
Marvellous, thanks for the input folks. So, in a nutshell, what we're basically saying is that when using Wicket we recommend HTTPS and disabling URL rewrite (we are using weblogic and I presumed one of the other settings should have disabled URL rewrite, the fool I am, cookie-secure seemed