Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:73328 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 80254 invoked from network); 20 Mar 2014 09:20:34 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 20 Mar 2014 09:20:34 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.217.181 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.217.181 mail-lb0-f181.google.com Received: from [209.85.217.181] ([209.85.217.181:35579] helo=mail-lb0-f181.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 99/08-33112-0E2BA235 for ; Thu, 20 Mar 2014 04:20:33 -0500 Received: by mail-lb0-f181.google.com with SMTP id c11so368625lbj.40 for ; Thu, 20 Mar 2014 02:20:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=LLGpjkWpQcHdvIvIfg+SmurEs0EL+YYrpYXswbhPfUE=; b=payd/+tkqd4KvE0wAGluU/B9duxwOFxwAYY90VYPrmUIwhb6G8IL6NZNravvIZtmLO 9jnWC+30w+KCSzmh+TX1lIGFh2/VgosT9CilzgFDTLC/VRlhG9L2mhJ7F4vvER9Bqg/L Neo0QyGx7BwayrkWnNzOv5bwHqXWNwRZi81JIXlkrb8Vy2OoOa5OZzVlizmBZ5AXrIMS IlVMw74hgwpXk4QxvbkD/u8rmzNfUNQfJrZH9RK2AaYsAeumQAA3vgXFCk3BxlUtffzb Gtzu9VFsTIBQToW3krVRdgJ0zQSDRlrw0ClzekmBgjZmIc1i6ys9IBgntrO4oh+Ha1nk HUPA== X-Received: by 10.153.11.163 with SMTP id ej3mr29249220lad.17.1395307230102; Thu, 20 Mar 2014 02:20:30 -0700 (PDT) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.112.205.73 with HTTP; Thu, 20 Mar 2014 02:19:49 -0700 (PDT) In-Reply-To: <20140320091326.GA65574@mail> References: <20140319080229.GA83863@mail> <20140319111131.GB83863@mail> <20140320082346.GA61204@mail> <20140320091326.GA65574@mail> Date: Thu, 20 Mar 2014 18:19:49 +0900 X-Google-Sender-Auth: b96Q6Vbg9VDrp6gP24qXg6e9oDw Message-ID: To: Mateusz Kocielski Cc: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a1134635acd8aa604f5064770 Subject: Re: [PHP-DEV] [RFC] [Discussion] Secure session_regenerate_id() From: yohgaki@ohgaki.net (Yasuo Ohgaki) --001a1134635acd8aa604f5064770 Content-Type: text/plain; charset=UTF-8 Hi Mateusz, On Thu, Mar 20, 2014 at 6:13 PM, Mateusz Kocielski wrote: > On Thu, Mar 20, 2014 at 05:30:36PM +0900, Yasuo Ohgaki wrote: > > Hi Mateusz, > > > > On Thu, Mar 20, 2014 at 5:23 PM, Mateusz Kocielski >wrote: > > > > > > > I agree. But we've got more factors here, it's not a simple tool > for > > > > > detection > > > > > of crimes. If we let "old session" live for x secs, what will > happen to > > > > > changes done to the old session? How do you want to resolve that? > We > > > should > > > > > find a balance between complexity and security. > > > > > > > > > > > > > > Currently we have poor mitigation. My proposal provides better > > > mitigation. > > > > > > I still don't see how you want to handle inconsistency between > sessions. It > > > seems that your RFC silently ignores that issue. > > > > > > I'm not sure which inconsistency. Could you specify/describe it? > > Consider following scenario: > > 1. session_regenerate_id(..) is called > 2. request to /update_session with old session id is done (some key-value > in > session is changed) - with your change this request will succeed > --- from here user uses only new session - > 3. updated key-value is missing in new session > > (same scenario can be triggered now if old session is not deleted) This race condition will not change with or without my proposal. Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --001a1134635acd8aa604f5064770--