setcookie: current_user="jdoe" is NOT safe, LOL!
Jeremy
Make sure to check your code with a penetration test or at least
against session fixation vulnerability.
Paolo
--
"... static analysis is fun, again!"
OWASP Orizon project leader, http://github.com/thesp0nge/owasp-orizon
OWASP Esapi Ruby project leader, https://github.com/thesp0nge/owasp-esapi-ruby
Jeremy
On Mon, May 9, 2011 at 3:53 AM, Paolo Perego <thes...@gmail.com> wrote:
> Hi Cesare, please note that re-inventing the wheel instead of using
> well known and widely tested solutions for basic tasks (as auth) can
> be risky from a security point of view.
>
> Make sure to check your code with a penetration test or at least
> against session fixation vulnerability.
>
> Paolo
> --
> "... static analysis is fun, again!"
>
> OWASP Orizon project leader, http://github.com/thesp0nge/owasp-orizon
> OWASP Esapi Ruby project leader, https://github.com/thesp0nge/owasp-esapi-ruby
>