[dev] Fwd: [Bug 1246] New - session hijacking using referer
URL
Eric Rostetter
eric.rostetter at physics.utexas.edu
Tue May 13 22:11:31 PDT 2003
Quoting Salim Virani <me at salimvirani.com>:
> Rather than intercepting the attack by trying to obscure the referrer
> information, it might be worth considering strengthening the actual
> authentication method as well.
That is what https: and/or cookies do. ;) The attack only works
when you don't provide either of those options.
> Implementing some kind of digest authentication would mitigate this and
> other attacks because the authentication mechanism would be more
> sophisticated than the simple sessionid token used now.
I'm not sure it would be any more sophisticated really. Just less static.
> It would also
> be stronger than a solution bolstering the existing authentication
> method with IP or referrer detection because those can be spoofed.
Can't use IP or referer because they can change (use behind a proxy,
user with dhcp, etc) or remain static across users (multi-user system,
etc).
> This method is already supported by later browsers at the HTTP layer
> but it could also be put together using a little javascript at the
> application layer. (An HTTP layer solution would be more secure as it
> wouldn't be prone to javascript sniffing and so on)
>
> (See http://www.ietf.org/rfc/rfc2617.txt for a description of HTTP
> Digest Auth)
Not a good solution as it provides no logout (other than closing
the browser), only a login.
> I'm humbly throwing this out there as a suggestion. I'm not familiar
> with IMP3 code or this scenario in detail. Is this a reasonable
> suggestion?
I think a url director would be better in this case. It is easier to
implement, solves the problem, and doesn't have any limitations.
The only problem with a url redirector would to be to make sure it
was used in all the correct places (e.g. that we don't miss some place
that generates a url, and leave it vulnerable via that path).
--
Eric Rostetter
The Department of Physics
The University of Texas at Austin
Why get even? Get odd!
More information about the dev
mailing list