[1.6.x] Clarified session replay attack differences with cookie backend.
Backport of 00a0d3de02
from master
This commit is contained in:
parent
dc26f3fc9b
commit
9b89fcc0b0
|
@ -162,8 +162,12 @@ and the :setting:`SECRET_KEY` setting.
|
|||
integrity of the data (that it is all there and correct), it cannot
|
||||
guarantee freshness i.e. that you are being sent back the last thing you
|
||||
sent to the client. This means that for some uses of session data, the
|
||||
cookie backend might open you up to `replay attacks`_. Cookies will only be
|
||||
detected as 'stale' if they are older than your
|
||||
cookie backend might open you up to `replay attacks`_. Unlike other session
|
||||
backends which keep a server-side record of each session and invalidate it
|
||||
when a user logs out, cookie-based sessions are not invalidated when a user
|
||||
logs out. Thus if an attacker steals a user's cookie, he can use that
|
||||
cookie to login as that user even if the user logs out. Cookies will only
|
||||
be detected as 'stale' if they are older than your
|
||||
:setting:`SESSION_COOKIE_AGE`.
|
||||
|
||||
**Performance**
|
||||
|
|
Loading…
Reference in New Issue