L
LenaMsdn08
We recently had this discussion at work - someone had suggested implementing
single sign-on by passing a random 32-byte key in the query string and match
it against a database that is used by both applications. Both sites are
written in ASP.NET 1.1
It was pointed out that passing this key in the query string was a huge
security hole; anyone who intercepted the request on the Internet could then
use the key to log in.
On the other hand, wouldn't any unencrypted (using http, not https) website
be vulnerable pretty much no matter what you do? For example, even if the
session object is server-side, isn't the cookie that stores the session ID
passed in the HTTP request, so just as well as intercepting the query string,
couldn't someone intercept the cookie and hijack the session?
(My apologies for the lack of correct terminology in this post.)
single sign-on by passing a random 32-byte key in the query string and match
it against a database that is used by both applications. Both sites are
written in ASP.NET 1.1
It was pointed out that passing this key in the query string was a huge
security hole; anyone who intercepted the request on the Internet could then
use the key to log in.
On the other hand, wouldn't any unencrypted (using http, not https) website
be vulnerable pretty much no matter what you do? For example, even if the
session object is server-side, isn't the cookie that stores the session ID
passed in the HTTP request, so just as well as intercepting the query string,
couldn't someone intercept the cookie and hijack the session?
(My apologies for the lack of correct terminology in this post.)