[13656] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Session Fixation Vulnerability in Web Based Apps

daemon@ATHENA.MIT.EDU (Pete Chown)
Tue Jun 17 07:57:45 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 17 Jun 2003 09:52:24 +0100
From: Pete Chown <Pete.Chown@skygate.co.uk>
To: cryptography@metzdowd.com
In-Reply-To: <8C9A566C643ED6119E8900A0C9DE297A32469D@saturn.aculab.com>

Jill.Ramonsky@Aculab.com wrote:

> When the user logs in, the server stores the client's IP address in a
> session variable (so it's stored at the server end - the client just gets a
> session id). Authentication of subesequent pages is assumed only if the
> client's IP address matches the IP address stored in the session variable
> corresponding to the client's session.

Unfortunately not all users have a single IP.  I know AOL users, for 
example, go through a cluster of proxies that all have their own IP 
addresses.  This means that the web server can see a different IP every 
time the browser makes a request.

You might also have a problem with multi user machines.  The users on 
the machine would be able to take over each others' sessions, even if 
they couldn't do it with outsiders.

I don't think this session ID problem is a fundamental design error, 
it's just a bug in certain implementations that are out there at the 
moment.  If a server receives a session ID from a browser that doesn't 
exist, it shouldn't simply create it.  Instead it should issue a new 
random session ID.  This solves the problem doesn't it?

-- 
Pete


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post