Developing a secure PHP login and authentication strategy

前端 未结 8 1577
借酒劲吻你
借酒劲吻你 2020-12-13 03:05

I\'m developing a login and authentication system for a new PHP site and have been reading up on the various attacks and vulnerabilities. However, it\'s a bit confusing, so

8条回答
  •  自闭症患者
    2020-12-13 03:55

    A few random thoughts :

    1. What if I steal the cookie of one of your users (using an XSS attack by injecting some JS code in your website) ? I will then fall in case 2. and thus be able to log in. IMHO, if you want a really secure authentication, do not use "remember me"-type cookies to store user credentials.
    2. If you do store the credentials in a cookie, please don't store the password in clear.
    3. Checking for the HTTP_USER_AGENT is a good first step to prevent session hijacking, but maybe you could combine it with the IP address ? It is far more difficult to be on the same host than your target than to simply use the same browser.

    But in any case, thanks for taking the time of thinking about a good authentication scheme. A lot of PHP developers don't.

    EDIT: for the record, let me clarify a point here : there are two cookies in this discusion. One being set automatically by PHP to propagate the session ID (sometimes, we see websites putting it in the URL, eg www.example.com/page.php?sessionId=[...]), and the second one created by you in order to store the user credentials and authenticate him when the session is lost. The XSS attack applies to both, ie an attacker could either steal the session cookie and hijack the session (which has a limited lifetime), or steal the credentials cookie and authenticate later.

提交回复
热议问题