COOKIES AND SESSIONS http://www.flickr.com/photos/torkildr/3462607995/ HTTP is “stateless” • By default, web servers are “forgetful” • As far as they can tell, every request comes from a totally new and different browser – (Not exactly true. We'll discuss persistent connections in the context of performance.) Pros of stateless servers • Chief benefit: Potential for replication – Improved performance: A sysadmin can fire up N copies of a website (on N machines) and any machine can serve each request. – Improved reliability: If a machine crashes, then another can be started up in its place, and no data gets lost in the process. Cons of stateless servers • Chief problem: Keeping track of which requests "go together" – Security challenge: If a user submits username & password in http request X, then tries to access resources in http request Y, how does the server know that request Y is from somebody who already logged in? • By the time that request Y comes in, the server will already have forgotten that request X ever occurred. • And on a replicated system, request Y might be served by a different machine than request X. Cookies to the rescue! • Reminder: – Cookie = a piece of data that is automatically copied between the client and server • Cookies can be set by the client (as in the last unit) or by the server. A simple way to use cookies for login… • When user sends a valid username & password in request X, the server replies with a cookie containing the username & password • When user subsequently makes request Y, the browser sends along the cookie. – Sounds appealing: user only needs to log in once – Serious security hole: anybody who gets his hands on the user's computer can see cookies Using just cookies for login Browser Server Type username & password Send username & password Authenticate Click a link or whatever Cookie = usernm&pwd Request page (send cookie) Send back page Warning This design contains a serious security hole. A more secure way of cookies+login • When user sends a valid username & password in request X, the server replies with a cookie containing a secret that the client couldn't possibly have guessed. • When user subsequently makes request Y, the browser sends along the cookie. – Since the client couldn't have guessed this value without logging in, the server knows that the user did in fact previously log in. Using cookies for login Browser Server Filesystem or Database Type username & password Send username & password Authenticate Click a link or whatever Cookie = the random # Request page (send cookie) Send back page Store a random number valid only for next 10 minutes Check if the number is right; if so, give another 10 minutes Session = state stored across requests • This is what we call a "session" • Session is basically an add-on to the basic http functionality of a website – So that the website can remember information across requests. • You can store lots of stuff in session – Numbers, strings, stringified objects, … Pros of sessions • Stores information between requests • Much more secure than the simple cookiebased approach I showed you – A bad person would need to steal the random number (cookie) within 10 minutes of its creation Cons of sessions • Requires your web server to have write-access to some sort of storage medium – File system, database, …, if you want replication – Otherwise just use memory (lost on server crash) • Requires user to access site every few minutes – Though you can configure longer or shorter times – This is a tradeoff between usability & security. – EECS servers currently are set to 24 minutes. Simple example of using session <?php session_start(); if (isset($_SESSION['numhits'])) $_SESSION['numhits'] = $_SESSION['numhits']+ 1; else $_SESSION['numhits'] = 1; echo "You hit my server ".$_SESSION['numhits']." times."; ?> Authentication (Using hardcoded username&pwd for now) <?php session_start(); /* login.php */ if (array_key_exists("username", $_REQUEST) && array_key_exists("password", $_REQUEST)) { /* here is where we would check the username and password */ $_SESSION['uid'] = 1; echo '<a href="inventory.php">View Inventory</a>'; } else { ?> <form action="login.php" method="POST"> <div>Username: <input type="text" name="username"></div> <div>Password: <input type="password" name="password"></div> <div><input type="submit" value="OK"></div> </form> <?php <?php session_start(); /* inventory.php */ } if (isset($_SESSION['uid'])) echo "This is where we would show inventory."; ?> else echo "You need to <a href='login.php'>Log in</a>"; ?> You can set cookies without session <?php $nhits = isset($_COOKIE['numhits']) ? $_COOKIE['numhits'] : 0; $nhits = $nhits + 1; setcookie('numhits', $nhits, time()+86400*365); /* expires in 365 days */ echo "You hit my server ".$nhits." times."; ?> Summarizing cookies vs sessions • Cookies – Little bits of data that are stored on client but also copied automatically to the server – Useful for storing little bits of data on the client, but they are visible to everybody • So don't store sensitive data in cookies • Sessions – Data is stored on the server (e.g., filesystem), keyed by a random number – The random number is sent as a cookie to the browser – And the random number expires after a little while When to use cookies vs sessions • Use cookies when – You need to save a small amount of data between requests, and it doesn't need to be kept secret • Use sessions when – You need to save a larger amount of data between requests, or when the data needs to be secret Examples of information not to store in unencrypted cookies • • • • • • • Passwords Credit card numbers Social security numbers Student ID numbers Birthdates List of diseases the user has contracted Anything that must be kept secret Yet another caveat • After all of those warnings, you still can save secret data in cookies, IF IT IS ENCRYPTED • You will see how to do this later in the term • But we don't really use encrypted cookies much because it can cause usability problems.