Jump to content

Is it possible to go to cookie based session handling?

Featured Replies

Posted

Hello,

Is it possible to go to Cookie based session handling intead of default URL based? I got a responce from Ryan before here: http://community.inv...ost__p__2154327

Any further information would be appreciated. Thank you.

I've moved your topic to the IP.Board Feedback forum. The developers will be able to better explain the reasoning behind using URLs for session ID's.

  • Management

The public side of our software does use cookie based sessions. The AdminCP does not for security.

  • Author

The public side of our software does use cookie based sessions. The AdminCP does not for security.




Is there any way to implement cookie based session handling in ACP? I'm not concerned about security for my site (no kidding! %7Boption%7D ), since I already renamed the ACP folder, .htaccess folder protection along with implemented SSL on entire ACP.
  • Management

There's no way that I know of. The ACP side doesn't even check for cookies :)

Not to be blunt, but does it really matter?

  • Author

Not to be blunt, but does it really matter?




:no:

Not to be blunt, but does it really matter?




I am also curious, however I'd reword the question.

What is the reason that it matters whether the ACP uses cookie or URL based session handling?

The public side of our software does use cookie based sessions. The AdminCP does not for security.




can anyone elaborate on this please. I'm not sure why is it more secure to use url based session for ACP
  • Management


can anyone elaborate on this please. I'm not sure why is it more secure to use url based session for ACP



Cookies are designed to remember your login state whereas the ACP does not ever remember your login state. This forces you to login again and therefore creates another layer of protection for the ACP. It also means that XSS is not possible in the ACP since a blind link redirect or something like that couldn't work since the ACP doesn't know who you are until you login.

Cookies are designed to remember your login state whereas the ACP does not ever remember your login state. This forces you to login again and therefore creates another layer of protection for the ACP. It also means that XSS is not possible in the ACP since a blind link redirect or something like that couldn't work since the ACP doesn't know who you are until you login.




but when I copy an ACP link from chrome to firefox, I find myself already logged in without invitation. That means someone using the same WAP IP as mine could potentially access my ACP if he/she managed to sniff an ACP from me?

But it's uncommon for someone else to have the same IP address as you. That would only come up in a public wifi hotspot or similar situation, and you should already be cautious transmitting sensitive data over public wifi networks.

IP address is checked when validating the session, so it's not generally possible to just steal a link and get into the ACP from a different computer.


But it's uncommon for someone else to have the same IP address as you. That would only come up in a public wifi hotspot or similar situation, and you should already be cautious transmitting sensitive data over public wifi networks.



IP address is checked when validating the session, so it's not generally possible to just steal a link and get into the ACP from a different computer.




thanks :)
does IPB checks the x-forward for IP or just the WAN IP? I know the first one can be forged.

The irony here is that I AM currently using a public wi-fi. I should be cautious then :ninja:
  • Management


thanks :smile:


does IPB checks the x-forward for IP or just the WAN IP? I know the first one can be forged.



The irony here is that I AM currently using a public wi-fi. I should be cautious then :ninja:



There's a setting to check x-forward.
  • Management

As others have said, the only way to 'steal' a session in the ACP is if you handed out a URL. I can't think of a single reason why you would do that.

  • Author

Interesting discussions ... I'm using SSL on ACP and it does really matter for me? :no: I don't think so, even though I posted the question! :laugh:

  • Management

I would just use the tool in the security centre to set up a .htaccess password on the admin directory so even if someone did manage to somehow get your session key, they would need to enter an authentication password to get in.


I would just use the tool in the security centre to set up a .htaccess password on the admin directory so even if someone did manage to somehow get your session key, they would need to enter an authentication password to get in.




I have that and also I've set-up an IP based restriction and configured CSF to ban any IP that fails to authenticate himself more than 5 times.
  • Author

Is there anyway to implement "nice user interface" for .htaccess login on ACP?


Is there anyway to implement "nice user interface" for .htaccess login on ACP?



No, that is controlled by the browser.

Archived

This topic is now archived and is closed to further replies.

Recently Browsing 0

  • No registered users viewing this page.