Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Getting a signature from the browser
Message
From
12/02/2014 06:00:36
 
 
General information
Forum:
ASP.NET
Category:
Other
Environment versions
Environment:
VB 9.0
OS:
Windows 7
Network:
Windows 2003 Server
Database:
MS SQL Server
Application:
Web
Miscellaneous
Thread ID:
01583960
Message ID:
01594124
Views:
33
>>>I think MS missed the boat by using the mangled URL as alternative. Having the cookie stored within normal payload data would have been better - even down to allowing new, encrypted non-diskable cookies to be updated via HTTPS:// rest without breaking too much other architecture.
>>
>>Yes, this is exactly my point. If it would have been simply added in the query string, I would have been ok with that. At first, this is what I thought it was. Today, when I started to look at this, this is where I realized "Oh, is that really what the URL would look like".
>
>It looks like that on your browser (and may be visible in the same way in browser history) - but with https it's encrypted over the wire.
>In that respect I don't see it as being any less secure than cookies.

true if only one-shot get/post are exchanged. Having cookie-like validation embedded in the payload would make it easier for REST/Ajax/Soap-style enhancements and lessen the pain of rewriting URLs and the ease serverside other stuff mentioned in thumbs down. The URL-mangling smells like premature optimization to me, unless you find some measurements citing massive gains.
Previous
Next
Reply
Map
View

Click here to load this message in the networking platform