Hi Lisa,
(It’s Marc, BTW) 😉
Here’s the problem. Assume that Joe Hacker comes along and decides to fool around with some data I have cached in the cookie/session - unless there’s a secure hash or encryption making sure that data is in the same state I left it, it’s a great way to fool the backend into doing something it shouldn’t.
For instance the $SESS cookie, IIRC, stores things like the users ID and group ID, but if this is only plain text someone could elevate their groupID or change their userID to a number of their choosing, and thererfore spoof the engine into doing something it shouldn’t, could they not?
Normal users won’t do this of course and so far all I’m actually caching is only “display” information to save reading it back from the database but it struck me that some of the EE values are also stored in a session: for the same reason.
(George Schlossnagle discusses this at length in his book Advanced PHP Programming (http://www.amazon.com/exec/obidos/tg/detail/-/0672325616/) which is one of my bibles.)
EDIT: Lisa - I don’t see a session ID in the URL Firefox or Safari - is this a feature of those browsers? I can’t test Windows based browsers since I develop on a Mac!