Re: Session_id within URL

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I also use those sessions when checking on the apache logs. For a specific
user, so i can trace what he did.

On 4/12/06, Richard Lynch <ceo@xxxxxxxxx> wrote:
>
> On Tue, April 11, 2006 12:40 pm, Alain Roger wrote:
> > I would like to understand the purpose of placing SESSION_ID within
> > the URL.
> > I suppose it is for security improving... However, how to do it ?
> >
> > i mean how can it be useful ? how can i use it ?
>
> Actually, unless you are using SSL (https://example.com) then it
> REDUCES security as somebody *could* intercept the session ID.
>
> What it increases is browser-compatibility -- Specifically, it allows
> browsers and other user agents that do not accept/return cookies to
> use a session.
>
> Some users, such as myself, do not generally allow Cookies unless they
> want the content bad enough, and trust the site to not be sharing
> personal/trackable information with other sites.
>
> It's a pain in the ass, but it's important to me to not get as much
> JUNK mail, email, etc and I *KNOW* sites are doing this kind of thing
> when I use unique email addresses and they cross from one site to the
> next.
>
> E.G., just yesterday the City of Chicago sent spam to a unique email
> address I gave to PIRG.
>
> If your cookies are always on, always accepted, you have to assume
> that SOME sites are tracking you, sharing the URLs you visit with
> other sites, and sharing whatever personal info they can find out
> about you with their partner/affiliate sites, who can then target
> their advertising (on-line and off-line) at you.  They've invariably
> wrapped this all up in a very long-winded "Privacy (sic) Policy" which
> nobody reads anyway.
>
> Using Sessions in the URL can be as simple as turning on the options
> in php.ini, or using .htaccess to turn them on.
>
> You could also roll your own to embed the session ID in the URLs you
> care about, ignoring, for example, images and javascript and CSS, and
> thus making your site SLIGHTLY less standard and amenable to attack
> from a shotgun random-selection of victim.  Of course, that's
> off-balanced by your maintainability of the code you have to
> write/maintain yourself to handle the session ID. It's not a TON of
> code, for some well-structured applications, so in some cases it's
> probably "worth it"
>
> There are also some techniques you can take to validate the user with
> session IDs over non-SSL connections:
>   Alter the session ID on a regular basis, so that "old" IDs are void
>   Embed a second token in the GET/POST data that also expires
>   Challenge users for passwords before particularly sensitive actions
>
> --
> Like Music?
> http://l-i-e.com/artists.htm
>
> --
> PHP General Mailing List (http://www.php.net/)
> To unsubscribe, visit: http://www.php.net/unsub.php
>
>


--
Louie Miranda (lmiranda@xxxxxxxxx)
http://www.axishift.com

//JSM-W

[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux