Penetration Testing mailing list archives

Re: [PEN-TEST] HTTP Secure Session State Management


From: Bill Reamy <bill () staffnet com>
Date: Sun, 24 Dec 2000 13:15:25 -0500

Apart from RFC 2965 (cookies) what other methods are available to
developers to manage sessions securely; i.e. authenticate each session
in a transaction ?

Is a decorated URL  a better option ?
... snip ...
Decorated URLs, containing session ID's, are almost always worse.
... snip ...
If you go to a different (off-site)
page, from a page containing 'decorated urls', the URL you came from
(referrer) can get logged.
... snip ...
This problem is still visible in a lot of web-based systems today.
(urls with session IDs are a potential security leak for me - so it's not
that offtopic :) )
... snip ...

  The latest version of iMail, from Ipswitch solves this problem
 (somewhat) by associating identity with both a session id in the url,
 _and_ the user's IP address. Both must match before the next page
 loads.

  This won't help if the attacker and victim are both on the same NAT
 device (they'd have the same IP). It won't help if the victim is using
 a web proxy. And it does not allow AOL users to use the webmail system
 because they rotate through multiple web proxies with different IP
 addresses (AFAIK).

  If you are designing a web system that requires authentication, why
 not use HTTP Authentication? It's not perfect, but at least the browser
 was designed to not give this info up easily.


Current thread: