|
Posted by shimmyshack on 05/30/07 11:09
On May 24, 11:44 am, ast3...@gmail.com wrote:
> I guess I don't really understand then. I was under the impression
> that it was the symmetric key because of section 2.3 in the article.
> ------------QUOTE------------
> Fu's cookie protocol is vulnerable to replay attacks, which could be
> launched in the following two steps. The first step is to steal a
> cookie that a server issued to another client. An attacker may have
> several ways to steal a cookie from someone else. For example, if a
> client stores a cookie in his hard disk, an attacker may steal it
> using Tro jans, worms, or viruses. An attacker may steal a cookie by
> launching a Denning-Sacco Attack [3]. In such an attack, an attacker
> first collects a large number of messages that are encrypted by the
> same SSL session key, and then obtains the SSL session key using
> various methods. In the second step of a replay attack, the attacker
> initiates an SSL connection with the server and replays a stolen
> cookie that has not yet expired. Consequently, the server incorrectly
> authenticates the attacker as the spoofed client, and allows the
> attacker to access the spoofed client's account.
>
> To counter replay attacks, we propose to add the SSL session key into
> the keyed hash message authentication code of a cookie, i.e., to use
> HMAC(username|expiration name|data|session key, sk) as the keyed-hash
> message authentication code of each cookie. Therefore, a cookie
> becomes session specific. Even if an attacker steals a cookie, he
> cannot successfully replay it since the session key is known only to a
> legitimate client and the server that creates the cookie.
> ------------QUOTE------------
>
> What I don't understand is how using the PHPSESSID would make it
> anymore secure. You could still replay the cookies if you had physical
> access to them, which I thought was what using the session key was
> trying to prevent.
no no you are right, sorry, I just read that, I will read the pdf
later
using this method would make it more secure, it begs the question why
include the session key rather than just a bit of it, and also how
does php get hold of this key as apache deals with the encryption of
the session, but as I say, Ill have to read it later, sorry to have
come back so quickly with a rubbish reply!
Navigation:
[Reply to this message]
|