可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试):
问题:
While I was reading about session hijacking articles, i learned that it would be nice to encrypt session id value that is stored in a cookie.
As far as I know, when I start a session by calling session_start()
, PHP does not encrypt session id value in a cookie.
How do I encrypt session id value and then initialize session with it?
回答1:
Encrypting won't help. The session cookie is just a magic number anyway. Encrypting it just means there's a different magic number to hijack. Depending on what hijacking scenarios you have in mind, there are other possible mitigations. For example, you can limit sessions to a single IP. That poses some issues though, e.g. people switching between wireless points.
回答2:
It's more important that your session IDs are random (that is, someone can't use their session ID to guess another person's), as the real danger is somebody getting their hands on another user's session ID. As long as you keep them truly random, there's no reason to or utility in encrypting it
回答3:
Assuming your session cookie is a GUID, there is no point encrypting it. It would just replace one pseudo-random string with another.
回答4:
Unfortunately encrypting the session ID is not going to increase security much, as the attacker can just use the encrypted form (which is the only thing visible to them anyways).
The only thing this might prevent is the trick where you send someone a link with ?PHPSESSID=foo in it, which will cause PHP to create that session. You can prevent that by using encryption and validation, but you should rather turn off session ID transfer in the URL completely.
回答5:
It's always a good idea to never depend on solely on one cookie or item to validate your (logged in) user(s). As mentioned above, it's a good idea to also store the IP and check with that. A good addition would be to store the USER_AGENT.
Bare in mind that if your application is open sourced, you're just as good with a session id alone because the hacker could easily identify what it is you're validating against.
回答6:
Make this script, access it from a web browser, then check your cookies.
<?php
session_start();
?>
You will likely see something like this
Site Cookie Value
mysite.com PHPSESSID 6fktilab3hldc5277r94qh2204
PHP does a fine job if generating a nice, unique id. There's not point in encrypting this.
回答7:
The session ID is relatively unguessable, so that's not really the issue.
There are a things you can do related to this to counteract attacks:
- create a new session when a user signs in
- limit the length of a session
There are quite a few other things as well. I always recommend studying the Rails Guide on these issues-- it offers a very accessible explanation of known problems and countermeasures-- all equally applicable to PHP code.
回答8:
It makes sense to encrypt cookie data when you use cookies to store sensitive info. that only the server should read (decrypt).
There's no reason to encrypt session id, since the hacker can use that encrypted session id to impersonate his victim.