Forum Moderators: coopster
The problem with passing the sessionID in the URL is that it's open to hijacking. On my site, I have a custom timeout script, which is about 3 to 5 mins. I'm sure this is enough but a user could still send a URL with the sessionID to someone else to login as them couldn't they?
Many places have mentioned that you can do extra checks such as the REMOTE_ADDR check but I've also read about concerns on this for people using dial-up, ISPs that change the IP address on every login, etc.
SO is there any other way at all of preventing hijacking?
yes they could unless you have some way of identifying them. I always used IP.
have you seen this library thread?
[webmasterworld.com...]
I know the isuues and I was very surprised that we didn't have any problems, but we didn't. It's an anomaly based on previous experience but we had to bind it to IP over https, just how it is and we had no issues with any AOL user that used our site.
strange but true
The problem with trying to use the IP address to track access is that there may easily be multiple members assigned to a proxy server. All of the member requests would appear to be coming from one member if you assumed a relationship between member and IP address. In addition, members may be reassigned to a different proxy server during a session.
When I did detailed log analysis (i.e. read them myself) about a year ago (HTTP access) I found the IP often changed for a single AOL user as he/she moved between pages on my site.
Should we go back to the original question?
A user turns off cookies, gets the sessionID in the url, mails it to someone else who then continues with their session.
How about insisting cookies are turned on (at least for AOL users).
Even so, I could get around that in 2 minutes because I can read and write cookies in my browser sessions. I could knock up a custom app for a friend (another 2 minutes work) that would do the same and I could then mail him the Cookies session ID.