Srinath

Is it possible to go to cookie based session handling?

20 posts in this topic

I've moved your topic to the IP.Board Feedback forum. The developers will be able to better explain the reasoning behind using URLs for session ID's.

Srinath likes this

Share this post


Link to post
Share on other sites

The public side of our software does use cookie based sessions. The AdminCP does not for security.




Is there any way to implement cookie based session handling in ACP? I'm not concerned about security for my site (no kidding! %7Boption%7D ), since I already renamed the ACP folder, .htaccess folder protection along with implemented SSL on entire ACP.

Share this post


Link to post
Share on other sites

Not to be blunt, but does it really matter?




I am also curious, however I'd reword the question.

What is the reason that it matters whether the ACP uses cookie or URL based session handling?

Share this post


Link to post
Share on other sites

The public side of our software does use cookie based sessions. The AdminCP does not for security.




can anyone elaborate on this please. I'm not sure why is it more secure to use url based session for ACP

Share this post


Link to post
Share on other sites


can anyone elaborate on this please. I'm not sure why is it more secure to use url based session for ACP



Cookies are designed to remember your login state whereas the ACP does not ever remember your login state. This forces you to login again and therefore creates another layer of protection for the ACP. It also means that XSS is not possible in the ACP since a blind link redirect or something like that couldn't work since the ACP doesn't know who you are until you login.

Share this post


Link to post
Share on other sites

Cookies are designed to remember your login state whereas the ACP does not ever remember your login state. This forces you to login again and therefore creates another layer of protection for the ACP. It also means that XSS is not possible in the ACP since a blind link redirect or something like that couldn't work since the ACP doesn't know who you are until you login.




but when I copy an ACP link from chrome to firefox, I find myself already logged in without invitation. That means someone using the same WAP IP as mine could potentially access my ACP if he/she managed to sniff an ACP from me?

Share this post


Link to post
Share on other sites

But it's uncommon for someone else to have the same IP address as you. That would only come up in a public wifi hotspot or similar situation, and you should already be cautious transmitting sensitive data over public wifi networks.

IP address is checked when validating the session, so it's not generally possible to just steal a link and get into the ACP from a different computer.

Share this post


Link to post
Share on other sites

But it's uncommon for someone else to have the same IP address as you. That would only come up in a public wifi hotspot or similar situation, and you should already be cautious transmitting sensitive data over public wifi networks.



IP address is checked when validating the session, so it's not generally possible to just steal a link and get into the ACP from a different computer.




thanks :)
does IPB checks the x-forward for IP or just the WAN IP? I know the first one can be forged.

The irony here is that I AM currently using a public wi-fi. I should be cautious then :ninja:

Share this post


Link to post
Share on other sites


thanks :smile:


does IPB checks the x-forward for IP or just the WAN IP? I know the first one can be forged.



The irony here is that I AM currently using a public wi-fi. I should be cautious then :ninja:



There's a setting to check x-forward.

Share this post


Link to post
Share on other sites

As others have said, the only way to 'steal' a session in the ACP is if you handed out a URL. I can't think of a single reason why you would do that.

Share this post


Link to post
Share on other sites

Interesting discussions ... I'm using SSL on ACP and it does really matter for me? :no: I don't think so, even though I posted the question! :laugh:

Share this post


Link to post
Share on other sites

I would just use the tool in the security centre to set up a .htaccess password on the admin directory so even if someone did manage to somehow get your session key, they would need to enter an authentication password to get in.

Srinath likes this

Share this post


Link to post
Share on other sites

I would just use the tool in the security centre to set up a .htaccess password on the admin directory so even if someone did manage to somehow get your session key, they would need to enter an authentication password to get in.




I have that and also I've set-up an IP based restriction and configured CSF to ban any IP that fails to authenticate himself more than 5 times.
Srinath likes this

Share this post


Link to post
Share on other sites

  • Recently Browsing   0 members

    No registered users viewing this page.