Support

Admin Tools

#24791 Question about cookie hijacking

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by on Wednesday, 27 April 2016 17:20 CDT

user87850
 Hi,

I was looking in your docs about feature that protect against session cookie hijacking but couldn't find. What I know about this problem is that somebody can get my administrator's session cookie and then use it to have access to Joomla backend. There's a feature ina Admin Tools named "PHP session data poisoning protection" but I'm not sure if it is designed for this reason.

Has Admin Tools protection against this problem?

nicholas
Akeeba Staff
Manager
What you are interested in cannot be protected against at the web application firewall level. The mode of attack is similar to this: you are accessing your site's administrator over plain HTTP (unencrypted) through an untrusted network or computer such as a public WiFi or a library computer. An attacker on the same network can sniff the unencrypted traffic and copy your cookies. Then, using the same network, they can pose as you on your website. There is nothing to do at the web application (Joomla!) level since the only thing it ever sees to authenticate you is a cookie. That's how it's supposed to work. Joomla! already ties your cookie to characteristics of the network and browser you use to access your site BUT an attacker on the SAME network who can sniff your traffic can impersonate all that information.

There is exactly one and only one way to protect your site against cookie theft: use HTTPS and do NOT log in to your site through somebody else's computer. Never, ever!

That's what you can do. Public WiFi network operators can do something to protect you: enable the wireless client isolation feature of their access points. This prevents traffic sniffing over WiFi. However this doesn't protect you against Ethernet (wired connection) traffic sniffing or WiFi network impersonation attacks. Especially the latter is really sneaky. An attacker can use a concealed monitoring device which makes your computer believe it's its preferred WiFi network and have it pass all the traffic through the monitoring device (man in the middle attack). The only way to successfully mitigate this class of attacks is using HTTPS with a commercial certificate and a server that support TLS.

In so many words, the only defense you have against someone stealing parts of your network traffic is encryption. Use HTTPS on your site. That's the one and only way.

Nicholas K. Dionysopoulos

Lead Developer and Director

πŸ‡¬πŸ‡·Greek: native πŸ‡¬πŸ‡§English: excellent πŸ‡«πŸ‡·French: basic β€’ πŸ• My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

user87850
Thank you very much for clarification. I found in the net tool called security check pro, and they write that they have features like: User session protection, Session hijacking protection. So I thought you may be know this tool and surely know the topic.

However for now for development sities I generated self-signed temporary certificates, but for one site production site I don't have certificate. I don't have there any personal data there and noticed that SSL pages are loaging much slower. Maybe I use not very good certificate. If you can kindly tell - does webpage loading speed with SSL depends on certificate type and company that issued/sold it? I have one Commodo Positive SSL sold by gogetssl.com.

nicholas
Akeeba Staff
Manager
Session hijacking IS NOT necessarily the same as cookie stealing. Nobody can claim they can protect you from cookie stealing unless they are lying to you. Session hijacking can also be performed through session fixation, cross site scripting and clickjacking. The former two are dealt by in the Joomla! core, the latter can be protected against through Admin Tools' .htaccess Maker. Moreover what they call "session protection" is the same as our SessionShield which only really applies to Jooma! 3.4.5 and earlier. Later versions include the security fix we submitted to Joomla! in the week between December 17th and 24th, 2015.

Regarding SSL certificates, self-signed certificates are not a good idea for public sites. If you have sites where the cost of a commercial SSL certificate is prohibitive you can issue one for free through Let's Encrypt. Recent versions of cPanel do offer an integration with it.

The signing certificate authority does not matter as far as performance goes. On top of that, if you have a decent server, i.e. a server that's been updated in the last 7 years, the performance drop is less than 3%. For a typical Joomla! site that translates to under 50 msec or 0.05 seconds – well below the standard deviation in load times. If you are experiencing a significant performance hit it's time to look for a different hosting company. Neither our business site (on HTTPS since 2010) or my blog site (on HTTPS since two weeks ago) had any measurable performance impact from the switch to HTTPS. Do note that I use two good quality hosts, SiteGround and Rochen.

Nicholas K. Dionysopoulos

Lead Developer and Director

πŸ‡¬πŸ‡·Greek: native πŸ‡¬πŸ‡§English: excellent πŸ‡«πŸ‡·French: basic β€’ πŸ• My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

user87850
Thank's very much for your answer. I will check your suggestions.

System Task
system
This ticket has been automatically closed. All tickets which have been inactive for a long time are automatically closed. If you believe that this ticket was closed in error, please contact us.

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!