[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] defense against session hijacking
- To: "Thomas M. Duffey" <tduffey@homeboyz.com>
- Subject: Re: [Full-Disclosure] defense against session hijacking
- From: "Gary E. Miller" <gem@rellim.com>
- Date: Mon, 17 Nov 2003 13:45:12 -0800 (PST)
Yo Thomas!
Some ISPs like AOL use ganged proxies/caches. You may get the same session
from different proxies as they round robin.
Overly agressive web caches are a big problem for web apps.
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
On Mon, 17 Nov 2003, Thomas M. Duffey wrote:
> Isn't it
> good defense for a programmer to store the IP address of the client
> when the session is initiated, and then compare that address against
> the client for each subsequent request, destroying the session if the
> address changes?
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html