From: | Adam Witney <awitney(at)sghms(dot)ac(dot)uk> |
---|---|
To: | Digital Wokan <wokan(at)cox(dot)net>, pgsql-php <pgsql-php(at)postgresql(dot)org> |
Subject: | Re: Transaction including two web page + timer |
Date: | 2002-11-18 10:33:44 |
Message-ID: | B9FE7288.BB04%a.witney@sghms.ac.uk |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-php |
But how then would you perform subsequent database connections? You would
have to keep asking the user for their password on every following web page?
>
> Grrrrrrrrrrrrrrrr! Damn reply-to not set on this list.
>
> Since the first reply went only to Adam and thus will benifit only one
> person, I'll retype it to the best of my memory and try to improve on my
> original reply so others may benefit.
>
> First, a correction to someone else's earlier comment. HTML is a
> document formatting language, not a protocol. HTTP/HTTPS is the
> stateless protocol in question.
>
> Second, it would be better to store a flag that it is a valid user.
> Store the username if it's necessary for tracking changes via a logging
> mechanism, otherwise leave it out as well. This way if someone finds a
> way of dumping session variables, you won't be giving away the keys to
> the kingdom. (For example a debugging script you forgot to delete from
> your production system that lists all the session variables and their
> values.)
> For added protection, you may even store the visitors IP address in a
> session variable to make sure any would-be spoofers not only have to get
> the right sessionid, but would have to spoof the IP address associated
> with that session as well. (Perhaps converting it to a 4 byte integer
> so anyone getting the session variables doesn't recognize it as an IP
> address.)
> aaa.bbb.ccc.ddd -> (aaa*256^3)+(bbb*256^2)+(ccc*256)+ddd
> I'm not sure if that last bit is useful. I don't know if PHP already
> has its own methods for preventing piggybacking onto another person's
> session. I know it can auto-rewrite links to append the sessionid when
> cookies may not be available. If such a page were emailed to another
> person, would the server recognize them as the original user since the
> sessionid being passed may still be valid? (I know, more a question for
> a strictly PHP list as opposed to PGSQL-PHP, but security questions have
> a habit of crossing boundaries.)
>
>
> ---------------------------(end of broadcast)---------------------------
> TIP 4: Don't 'kill -9' the postmaster
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
From | Date | Subject | |
---|---|---|---|
Next Message | scott.marlowe | 2002-11-18 17:07:26 | Re: Inquiry From Form [pgsql] |
Previous Message | Andy Dunlop | 2002-11-18 07:06:05 | Nested select to same tsble |