Hello,

I need inputs/answers on below points to implement a secure session
management application
Or if there is there any configuration that may need to be tuned to improve
below please point me to that
A)
Are Session IDs cryptographically strong and do not reveal sensitive
information so that they can't be guessed easily or used to find attack
vectors.
Does we meet below
1. Does Strong entropy sources being used to generate the session ID value
2. Does Strong cryptographic algorithms being used to generate the session
ID value
3. Does the session ID value provides at least 128 bits of entropy.
4. Is the session ID value meaningless to prevent information disclosure
attacks, allowing recovery of the contents of the ID and extract details of
the user, the session, or the inner workings of the web application.

B)
Are the Session IDs fully validated before they may be used.
When using session ID to keep authentication state and track user progress
within a web application, the application MUST treat the session ID as
untrusted data,
and sanitize and validate it before use.

Thanks a lot for your time.

Utkarsh Dave

Reply via email to