Forum Moderators: coopster
The problem is that that after loggin in, the user can request a non-secure page, i.e. the part of the site that doesn't need to be secure or require users to be logged in. The problem with this is that the sessionID will no longer be secured by SSL and it will not be changed on every page so a hacker could potentially get hold of the session and log in themselves.
Is there a way round this, or to somehow require the user to logout when leaving the secure site...or automatically destroying the session when leaving the secure site?
Would it be acceotable to keep changing the session id on the insecure site as well? That way if some moves, after having logged in, from SSL to normal, the session id will keep changing and the old one used to login will no longer be valid?
you should be able to set up your authentication to not allow session hijacking with out having to swap session ids all the time. Maybe you need to add more criteria to your session such as a time out and maybe even the user's ip address
maybe take a look at this thread
[webmasterworld.com...]
I guess the alternative would just be to regenerate a session ID each time the user has to do something to authenticate themselves, e.g. log in, reset password, etc.
There's also some stuff written about AOL changing the user's IP address on every request and multiple computers hiding behind a single IP address (corporate gateway) so that might rule out the IP check?