[Twisted-Python] Re: cred and stateless protocols
Manlio Perillo
manlio_perillo at libero.it
Mon May 8 02:17:43 MDT 2006
jarrod roberson ha scritto:
> [...]
> I simply have seen an UDP protocol that uses sessions to identify each
> request.
> The session is obtained after an authentication phase.
>
>
> if the sesssion id never changes I am SURE you have seen an insecure UDP
> protocol
Of course, as the 90% of internet (as far as I have seen)..
> which means unless the client and server are generating dynamic single
> use tokens and "know" what the next valid session id the client should
> send, which implies encryption plus authenticaiton on every request.
>
> Since I think that the procedure is similar to HTTP session handling, I
> was asking if there is some reusable support for creating "secure"
> session id and if cred has some support for this.
>
>
>
> you still don't understand STATE != Authentication.
>
> ANYONE can sniff the packets, get whatever token or breadcrumb you are
> using for the state id and spoof it.
> that is unless you REQUIRE authentication on every request. "secure"
> session id's imply a form of authenticaiton on every request.
>
Ok, but this implies (with simple authentication scheme like HTTP) to
double the number of requests/reponses.
And what if the authentication protocol is more complex?
> you can't just "encrypt" a string and call it a "secure" session id.
>
But I can generate a "secure" session and use it for encrypt every
request/response.
Or, more simply, one can use SSL.
Unfortunately many web site not use SSL or use only HTTP Base
Authentication...
By the way:
for user tracking in UDP, why not just use the peer address?
Thanks and regards Manlio Perillo
More information about the Twisted-Python
mailing list