首先,如果真的有正式的闪电/密码
暗示,我假定不存在,因为我已经找过,似乎不存在。 我混淆了这样做的手段,但希望得到一些反馈,了解它是否安全。
- Accessing a wrapper-page for a flash object will always go to secure https due to django middleware
- When the page view is loaded in Django, it creates a "session alias" object with a unique key that points to the current session in play (in which someone ostensibly logged in)
- That session alias model is saved, and that key is placed into a cookie whose key is another random string, call it randomcookie
- That randomcookie key name is passed as a context variable and written into the html as a flashvar to the swf
- The swf is also loaded only via https
- The flash application uses
ExternalInterface
to call java to grab the value at that randomcookie location, and also deletes the cookie - It then creates a
NetConnection
to a secure server https location, passing that randomcookie as an argument (data, not in the url) to a login-using-cookie rpc - At the gateway side, pyamf looks up the session alias and gets the session it points to, and logs in the user based on that (and deletes the alias, so it can t be reused)
- (And the gateway request could also set the session cookie and session.session_key to the known session ID, but I could let it make a whole new session key... I m assuming that doing so should affect the response properly so that it contains the correct session key)
- At this point, the returned cookie values on the flash side should stick to the
NetConnection
so that further calls are authenticated (if a connection is authenticated using username and password the normal way, this definitely works, so I think this is a safe bet, testing will soon prove or disprove this)
因此,这是否不安全,或者这项工作是否适当? 我知道,由于html网页被保证为超薄,关键和 co数据应当加密,而不是可以偷窃。 之后,该带的内涵应当安全,可以一次性使用,基本是临时密码,再次用斜体发送,因为大门口也是https。 之后,它使用通常的信用社系统,而不是从普通人手中做任何事情。