Currently when user logged in, i created 2 sessions.
$_SESSION['logged_in'] = 1;
$_SESSION['username'] = $username; // user's name
So that, those page which requires logged in, i just do this:
if(isset($_SESSION['logged_id'])){
// Do whatever I want
}
Is there any security loopholes? I mean, is it easy to hack my session? How does people hack session? and how do I prevent it??
EDIT:
Just found this:
http://www.xrvel.com/post/353/programming/make-a-secure-session-login-script
http://net.tutsplus.com/tutorials/php/secure-your-forms-with-form-keys/
Just found the links, are those methods good enough?? Please give your opinions. I still have not get the best answer yet.
Terminology
Understanding Sessions
In order to understand how to make your session secure, you must first understand how sessions work.
Let's see this piece of code:
As soon as you call that, PHP will look for a cookie called
PHPSESSID
(by default). If it is not found, it will create one:If it is found, it takes the value of
PHPSESSID
and then loads the corresponding session. That value is called asession_id
.That is the only thing the client will know. Whatever you add into the session variable stays on the server, and is never transfered to the client. That variable doesn't change if you change the content of
$_SESSION
. It always stays the same until you destroy it or it times out. Therefore, it is useless to try to obfuscate the contents of$_SESSION
by hashing it or by other means as the client never receives or sends that information.Then, in the case of a new session, you will set the variables:
The client will never see that information.
The Problem
A security issue may arise when a malicious user steals the
session_id
of an other user. Without some kind of check, he will then be free to impersonate that user. We need to find a way to uniquely identify the client (not the user).One strategy (the most effective) involves checking if the IP of the client who started the session is the same as the IP of the person using the session.
The problem with that strategy is that if a client uses a load-balancer, or (on long duration session) the user has a dynamic IP, it will trigger a false alert.
Another strategy involves checking the user-agent of the client:
The downside of that strategy is that if the client upgrades it's browser or installs an addon (some adds to the user-agent), the user-agent string will change and it will trigger a false alert.
Another strategy is to rotate the
session_id
on each 5 requests. That way, thesession_id
theoretically doesn't stay long enough to be hijacked.You may combine each of these strategies as you wish, but you will also combine the downsides.
Unfortunately, no solution is fool-proof. If your
session_id
is compromised, you are pretty much done for. The above strategies are just stop-gap measures.