We've invested some more research on this topic because session.invalidate
didn't work and came up with a solution. We've created a JIRA-Ticket
regarding this topic to document our solution.

https://issues.apache.org/jira/browse/WICKET-1767

Regards
Enes F.

On Wed, Jul 30, 2008 at 5:59 PM, Igor Vaynberg <[EMAIL PROTECTED]>wrote:

> doing that should be fine, just make sure that after login you
> redirect to a bookmarkable url which will then create a new session.
>
> so
> session.invalidate();
> loginuser();
> setrequesttarget(new bookmarkablepagetarget(...));
> getrequest().setredirect(true);
>
> -igor
>
> On Wed, Jul 30, 2008 at 7:15 AM, Enes Fazli <[EMAIL PROTECTED]>
> wrote:
> > Hi wicket users,
> >
> > we are currently in the process of securing our Wicket-powered
> > application against various attack vectors. One of them is Session
> > Fixation, as described here:
> > http://www.owasp.org/index.php/Session_Fixation
> >
> > The recommended protection in Java is to invalidate the Session before
> > authenticating the user, with something like this:
> >
> > HttpSession s = request.getSession(false);
> > if (s != null) s.invalidate();
> > s = request.getSession(true);
> >
> > Invalidating the session can be done with Session.get().invalidate()
> > or invalidateNow(), but that leaves, as far as I can tell,  Wicket's
> > Session in a broken state, preventing the login alltogether.
> >
> > Instead of continuing to tamper with Wicket internals, is there a
> > solution available?
> >
> > Regards,
> >
> > Enes F.
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

Reply via email to