[plug] Cookies

Bret Busby bret at clearsol.iinet.net.au
Fri Nov 24 16:03:10 WST 2000


The mailing list has various ISP's, website developers, and security
people.

I have complained to a company, about the use of cookies in the website,
as the website is such that it requires cookies to be enabled, to use
the website. Access to the website, is password protected, and, using
the website, involves travelling from web page to web page, and can
involve ten, or, tens of web pages, in a login session.

I avoid allowing cookies.

I have accessed a bank password-protected, 128-bit encrypted, website,
involving travelling between web pages (uses javascript, I believe, with
the security feature being provided by an applet), which has no need for
cookies. This facility works with Netscape 4.x, with 40 bit encryption
capability provided by the earlier versions (from 4.08 onward).

The response that I got from this company, most of which response
appears below, indicates that the use of cookies, is the only efficient
way to allow password-protected website access for e-commerce.

I know that the way that TWIG is setup, it uses cookies, in its
password-protected access.

I want to know what people on the list think about the proposition that
the only efficient way to allow password-protected access to an
e-commerce website, is via the use of cookies.

Thanks in anticipation, and, I apologise in advance, if anyone thinks
this is too far off-topic.
 
-- 

Bret Busby

......................................
"So once you do know what the question actually is, you'll know what the
answer means."
 - Deep Thought, Chapter 28 of The Hitchhiker's Guide to the Galaxy
 - Douglas Adams, 1988 
......................................
Cookies are used to identify a user and a session over the sessionless
nature of http (Web browsing). Without identification for every server
request the only way to maintain session based information is one of the
following three methods
     HTTP Header information (Authentication challenge/response).  As
used
     in the previous version of the website.  
     For this to be secured, all interactions with the server
     must use SSL as the usersname and password are transferred in EVERY
     click.  This has obvious performance issues:  for example using
40bit
     encryption this makes all conversations between the browser and the
     server 8 times larger.(1 byte in encrypted into 40bits=8bytes). 
Very
     few sites continue to use this method.
     URL re-writing - used by a number of sites. Some sites even revert
to
     this if the users don't accept cookies.  This method allows for
users
     that don't use cookies however it has serious security implications
     for both the server and the users.  This method writes the session
ID
     into the URL, meaning that session ID is immediately available in
     plain text, whether the request is in SSL or not.  Other security
     implications are that URL's are cached by proxy servers and on
     individual computers, thereby relying on the security of 3rd party
     computers (the proxy) to secure the users information.  Other
     inconveniences of this method include bookmarking. Users are unable
to
     bookmark pages that use URL re-writing as the sessionid will be
stored
     in the URL, and subsequent re-loads mostly result in invalid
session
     errors.
     Cookies.  There are 2 types of cookies, a) persistent (stored
     physically on the users computer and available in later sessions)
and
     b) session based (removed/lost when the browser is closed). Cookies
     are not stored in proxies.  Well written sites also do not include
     sensitive information in the cookies.  This website uses session
based
     cookies, which are not stored on the local system but kept in the
     memory of the currently running browser.  This provides the most
     convenient method of identifying a returning visitor (remember http
is
     sessionless so going to a home page and then clicking a link
indicates
     2 visits to the site for the server).

In the past, cookies were perceived as a security threat. This was
mostly
founded by skeptics, and particularly aimed towards corporations such as
Microsoft, whose programs have access to the hard drive.  It is a simple
matter for one of these programs to locate persistent cookies, and read
the
file contents, and then send the details via registration and other
processes.  Some facts about cookies:
        Browsers will only send cookies back to the site that sent them
        originally.
        Servers cannot request cookies to be sent to them, they can only
        accept what the browser sends.

The advent of session based cookies (such as those used by this website)
means that
many of these previous security concerns, are no longer a problem and
many
browsers such as Internet Explorer 5.0+ allow users to specify which
types
of cookies they will or will not accept.  As session based cookies are
not
stored on the users hard drive, they are not available to any malicious
programs that may be on a users computer.

This web site sends 2 session based cookies, neither cookie contains
sensitive information. One cookie contains a token used by the system
called serverName, to identify how requests from the user should be
processed, and the other called sessionid, contains a randomly generated
string to identify a unique session on the site.  To break into a users
session, BOTH cookies would be required to match in their unique
combination, and neither cookie is valid more than 30 minutes after a
user
has last used the site. (this website's sessions time out after 30
minutes for added
security).

Most modern technology e-commerce sites use cookies for the same purpose
as
this website, some of these sites still use persistent cookies not
session based
cookies, some examples of these are:
     Amazon.com - uses persistent cookies for user identification and
     sessions that don't time out.
     CDNow.com -- uses persistent cookies for user identification and
     sessions that don't time out.
     Greengrocer.com.au - uses persistent cookies for sessions.
     dstore.com.au - uses persistent cookies for sessions that don't
time
     out.
     wishlist.com.au - uses both persistent cookies for sessions and
     session based cookies for session information.
     kmart.com.au - uses persistent cookies for sessions that don't time
     out.

As you can see from the list above most e-commerce site use cookies. If
you
use Internet explorer and remove all the cookies from your cookie
directory, then modify your securtiy settings to prompt for all cookies
(both session based and persistent) you can see that not only do all
these
sites use cookies, but they often use a large number of cookies that are
persistent.
......................................



More information about the plug mailing list