Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IP binding with Cookies cant be enough ? #25

Open
threatdecoder opened this issue Apr 5, 2024 · 2 comments
Open

IP binding with Cookies cant be enough ? #25

threatdecoder opened this issue Apr 5, 2024 · 2 comments

Comments

@threatdecoder
Copy link

threatdecoder commented Apr 5, 2024

Hello Team,

I may be wrong, but I wanted to understand why IP address binding to cookie cant be enough to solve this problem?

Server maintains a cookie with the IP address of the session with which it is associated.

Whenever Server receives cookie from different IP address, it will raise for re-login.

Yes, network change will trigger this but we can accept it given the elimination of Stealer Malware.

@Sora2455
Copy link

Sora2455 commented Apr 5, 2024

Major services like social media, where session theft would be devastating, would find constant re-authentication untenable - especially on mobile, where network changes are frequent and common.

@arnar
Copy link
Collaborator

arnar commented Apr 5, 2024

IPs do change frequently, e.g. when moving between mobile and wifi connections, and as Sora2455 points out, frequent reauth can be high enough friction to make that untenable for many applications.

IPs can also be spoofable, or overtaken by attackers, and the mitigation mechanisms for that would be very far removed from either the client or the server.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants