Invision Community 4: SEO, prepare for v5 and dormant account notifications Matt November 11, 2024Nov 11
Posted September 16, 201113 yr Hello,Is it possible to go to Cookie based session handling intead of default URL based? I got a responce from Ryan before here: http://community.inv...ost__p__2154327 Any further information would be appreciated. Thank you.
September 16, 201113 yr I've moved your topic to the IP.Board Feedback forum. The developers will be able to better explain the reasoning behind using URLs for session ID's.
September 16, 201113 yr Management The public side of our software does use cookie based sessions. The AdminCP does not for security.
September 16, 201113 yr Author The public side of our software does use cookie based sessions. The AdminCP does not for security. Is there any way to implement cookie based session handling in ACP? I'm not concerned about security for my site (no kidding! ), since I already renamed the ACP folder, .htaccess folder protection along with implemented SSL on entire ACP.
September 16, 201113 yr Management There's no way that I know of. The ACP side doesn't even check for cookies :)
September 19, 201113 yr Not to be blunt, but does it really matter? I am also curious, however I'd reword the question. What is the reason that it matters whether the ACP uses cookie or URL based session handling?
September 19, 201113 yr The public side of our software does use cookie based sessions. The AdminCP does not for security. can anyone elaborate on this please. I'm not sure why is it more secure to use url based session for ACP
September 19, 201113 yr Management can anyone elaborate on this please. I'm not sure why is it more secure to use url based session for ACP Cookies are designed to remember your login state whereas the ACP does not ever remember your login state. This forces you to login again and therefore creates another layer of protection for the ACP. It also means that XSS is not possible in the ACP since a blind link redirect or something like that couldn't work since the ACP doesn't know who you are until you login.
September 19, 201113 yr Cookies are designed to remember your login state whereas the ACP does not ever remember your login state. This forces you to login again and therefore creates another layer of protection for the ACP. It also means that XSS is not possible in the ACP since a blind link redirect or something like that couldn't work since the ACP doesn't know who you are until you login. but when I copy an ACP link from chrome to firefox, I find myself already logged in without invitation. That means someone using the same WAP IP as mine could potentially access my ACP if he/she managed to sniff an ACP from me?
September 20, 201113 yr But it's uncommon for someone else to have the same IP address as you. That would only come up in a public wifi hotspot or similar situation, and you should already be cautious transmitting sensitive data over public wifi networks. IP address is checked when validating the session, so it's not generally possible to just steal a link and get into the ACP from a different computer.
September 20, 201113 yr But it's uncommon for someone else to have the same IP address as you. That would only come up in a public wifi hotspot or similar situation, and you should already be cautious transmitting sensitive data over public wifi networks. IP address is checked when validating the session, so it's not generally possible to just steal a link and get into the ACP from a different computer. thanks :) does IPB checks the x-forward for IP or just the WAN IP? I know the first one can be forged. The irony here is that I AM currently using a public wi-fi. I should be cautious then :ninja:
September 20, 201113 yr Management thanks :smile: does IPB checks the x-forward for IP or just the WAN IP? I know the first one can be forged. The irony here is that I AM currently using a public wi-fi. I should be cautious then :ninja: There's a setting to check x-forward.
September 21, 201113 yr Management As others have said, the only way to 'steal' a session in the ACP is if you handed out a URL. I can't think of a single reason why you would do that.
September 21, 201113 yr Author Interesting discussions ... I'm using SSL on ACP and it does really matter for me? :no: I don't think so, even though I posted the question! :laugh:
September 22, 201113 yr Management I would just use the tool in the security centre to set up a .htaccess password on the admin directory so even if someone did manage to somehow get your session key, they would need to enter an authentication password to get in.
September 22, 201113 yr I would just use the tool in the security centre to set up a .htaccess password on the admin directory so even if someone did manage to somehow get your session key, they would need to enter an authentication password to get in. I have that and also I've set-up an IP based restriction and configured CSF to ban any IP that fails to authenticate himself more than 5 times.
September 29, 201113 yr Author Is there anyway to implement "nice user interface" for .htaccess login on ACP?
September 29, 201113 yr Is there anyway to implement "nice user interface" for .htaccess login on ACP? No, that is controlled by the browser.
Archived
This topic is now archived and is closed to further replies.