[13642] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Session Fixation Vulnerability in Web Based Apps

daemon@ATHENA.MIT.EDU (Ng Pheng Siong)
Sun Jun 15 23:21:43 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 16 Jun 2003 10:10:44 +0800
From: Ng Pheng Siong <ngps@netmemetic.com>
To: "James A. Donald" <jamesd@echeque.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <3EEC59DF.9377.150CEDC7@localhost>

On Sun, Jun 15, 2003 at 11:34:55AM -0700, James A. Donald wrote:
> Which is fine provided your code, rather than the framework
> code provided the cookie, and provided you generated the cookie
> in response to a valid login, as Ben Laurie does..   The 
> framework, however, generally provides insecure cookies. 

Dynamic programming environments like Lisp, Smalltalk and Python allow
the application programmer to replace parts of a framework with other code
easily.

Lisp does it better than Python. Dunno about Java, PHP, whatnot.

Build your applications with a superior programming system.


-- 
Ng Pheng Siong <ngps@netmemetic.com> 


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post