Moving session IDs to cookies will also open you up to CSRF attacks.  :-)



On 2016-03-24, 10:21 AM, 
"webobjects-dev-bounces+chill=gevityinc....@lists.apple.com on behalf of OC" 
<webobjects-dev-bounces+chill=gevityinc....@lists.apple.com on behalf of 
o...@ocs.cz> wrote:

>Hello there,
>
>one of my applications drained its memory quickly; it looks like the primary 
>cause was creation of thousands sessions, which itself was caused by lots of 
>Google requests containing spurious (probably stored years ago) session IDs. 
>It seems each such request creates a new session, and hilarity quickly ensues.
>
>Of course, moving session IDs to cookies would help (and kicking out those 
>bloody Google bots from the server would help tremendously), but I wonder...
>
>... first, sometimes session IDs in URLs are needed, e.g., to allow concurrent 
>work in different sessions from more browser tabs/windows. Besides, an attack 
>can be created maliciously with spurious session IDs in cookies just as well.
>
>Is there a known and tested way to reliably prevent this kind of 
>session-induced death? Some trick to create new sessions only for valid 
>requests? Perhaps handleSessionRestorationErrorInContext redirecting to a 
>static address without a session ID, or something like that?
>
>Thanks,
>OC
>
>
> _______________________________________________
>Do not post admin requests to the list. They will be ignored.
>Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
>Help/Unsubscribe/Update your Subscription:
>https://lists.apple.com/mailman/options/webobjects-dev/chill%40gevityinc.com
>
>This email sent to ch...@gevityinc.com

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to