[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

RE: Re: Cookies at XML Europe 2004 -- Call for Participation

  • To: "Elliotte Rusty Harold" <elharo@m...>,"Rich Salz" <rsalz@d...>
  • Subject: RE: Re: Cookies at XML Europe 2004 -- Call for Participation
  • From: "Joshua Allen" <joshuaa@m...>
  • Date: Wed, 7 Jan 2004 15:56:37 -0800
  • Cc: "Berend de Boer" <berend@x...>,<xml-dev@l...>
  • Thread-index: AcPVbQK6MwCh0i78SDa/nwVpKL1kqQADD8ow
  • Thread-topic: Re: Cookies at XML Europe 2004 -- Call for Participation

man in middle attack
Regardless of whether you store your session token as Rich describes in a cookie, or in the URL, there is a danger that someone could use a man in the middle attack like you describe.  Tying the token to client IP address is a naïve approach, and will fail with clients from behind proxy farms at large ISPs.  If you are afraid of the traffic being snarfed, you have bigger problems, and should be using SSL.  Even with SSL, it is possible for a man in the middle attack to succeed (if someone can guess or otherwise obtain your token).  To prevent the man-in-middle attack altogether you need to use client certificates.

> -----Original Message-----
> From: Elliotte Rusty Harold [mailto:elharo@m...]
> Sent: Wednesday, January 07, 2004 2:17 PM
> To: Rich Salz
> Cc: Berend de Boer; xml-dev@l...
> Subject: Re:  Re: Cookies at XML Europe 2004 -- Call for
> Participation
> 
> At 4:15 PM -0500 1/7/04, Rich Salz wrote:
> 
> >No.  I'm saying without rest I send it once, store it at the server,
> >use a cookie to refer to it in future transactions.
> 
> Is the cookie sent unencrypted? If so, and we're not using SSL (as is
> the case in many cookie scenarios) what, if anything, prevents an
> attacker from snarfing the authentication cookie as it makes its way
> back from the client to the server (or in the other direction) and
> adding that to its own requests to the same server?
> 
> I hope there's something that prevents this. There must be. Otherwise
> this is a huge, gaping security hole much bigger than anything we've
> been arguing about, and I would think it would have lots of practical
> exploits on the Web today. Please tell me there's some reason this
> attack won't work.
> --
> 
>    Elliotte Rusty Harold
>    elharo@m...
>    Effective XML (Addison-Wesley, 2003)
>    http://www.cafeconleche.org/books/effectivexml
> 
> http://www.amazon.com/exec/obidos/ISBN%3D0321150406/ref%3Dnosim/cafeaulait
> A
> 
> -----------------------------------------------------------------
> The xml-dev list is sponsored by XML.org <http://www.xml.org>, an
> initiative of OASIS <http://www.oasis-open.org>
> 
> The list archives are at http://lists.xml.org/archives/xml-dev/
> 
> To subscribe or unsubscribe from this list use the subscription
> manager: <http://lists.xml.org/ob/adm.pl>


PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.