SlideShare a Scribd company logo
COOKIES
HTTP STATE MANAGEMENT MECHANISM
OUR TEAM
Bibek Subedi, 066 BCT 506
Dinesh Subedi, 066 BCT 512 Laxmi Kadariya, 066 BCT 518
Jivan Nepali, 066 BCT 517
June 19, 2013
PRESENTATION OUTLINE
 INTRODUCTION – Definition, Types, Purpose, Syntax & Semantics of Cookies
 COOKIE TECHNOLOGY – Components, Working Principle & Storage Model
 COOKIE: PRIVACY CONSIDERATIONS
 COOKIE: SECURITY CONSIDERATIONS
 COOKIE AUTHENTICATION GUIDELINES
INTRODUCTION
 A “cookie” is a small piece of information sent by a web server to store
on a web browser so it can later be read back from that browser. This is
useful for having the browser remember some specific information.
 Cookies were designed to be a reliable mechanism for websites to
remember the state of the website or activity the user had taken in the
past
 Although cookies cannot carry viruses, and cannot install malware on
the host computer, tracking cookies and especially third-party tracking
cookies are commonly used as ways to compile long-term records of
individuals’ browsing histories – Privacy Concern
PURPOSE OF COOKIES
 Cookies make the interaction between users and web sites faster and easier
 Web sites often use cookies of the purpose of collecting demographic information
about their users.
 Cookies enable web sites to monitor their users’ web surfing habits and profile
them for marketing purposes
 With the increasing commercial applications of the Internet, it was probably
inevitable that cookies would quickly be utilized for advertising purposes.
 Since cookies can be matched to the profile of a user’s interests and browsing
habits, they are a natural tool for the “targeting” of advertisements to individual
users.
TYPES OF COOKIES
 Session or Transient cookies
Cookies that are stored in the computer’s memory only during a user’s
browsing session and are automatically deleted form the user’s computer
when the browser is closed.
 Permanent, Persistent or Stored cookies
Permanent cookies can be used to identify individual users, so they may
be used by web sites to analyze users’ surfing behavior within the web
site. They are usually configured to keep track of users for a prolonged
period of time, in some cases many years into the future.
SYNTAX & SEMANTICS OF
COOKIES
1. Cookie Name
◦ public String getName();
◦ public void setName(String name);
2. Cookie Value
◦ public String getValue();
◦ public void setValue(String value);
3. Cookie Version
◦ public String getVersion();
◦ pulic void setVersion(String domain);
4. Cookie Age
◦ public in getMaxAge();
◦ public void setMaxAge(int lifetime);
EXAMPLE- SYNTAX &
SEMANTICS (Java)
Creating a Cookie
Step 1: Create a Cookie instance by calling the
Constructor
Cookie cookie = new Cookie()
Step 2: Set the name and value of the Cookie
cookie.setName(“ID”);
cookie.setValue(5);
(Both step can be done directly using Cookie
cookie = new Cookie(“ID”,5)
Step 3: Set and maximum age and version of
Cookie
cookie.setMaxAge(2500);
cookie.setVersion(1);
Step 4: Finally add the cookie object to the
response object
Response.addCookie(cookie);
COOKIE COMPONENTS
 HTTP is stateless. But, if an website wants to keep track the
identity of its user, then HTTP uses cookie for this purpose.
 Cookie technology has following four components
o A cookie header line in the HTTP response message
o A cookie header line in the HTTP request message
o A cookie file kept in the user’s end system & managed by the user’s
browser
o A back-end database at the website
WORKING PRINCIPLE:USER-SERVER
INTERACTION
 Suppose Susan, who always accesses the Web using Internet Explorer
from her home PC, contacts amazon.com for the first time.
 Let us suppose that in the past she has already visited the eBay site –
ebay.com.
 When the HTTP request comes in the Amazon’s web server, it creates
◦ unique Identification number
◦ entry in backend database that is indexed by the Identification number
for Susan
WORKING PRINCIPLE CONTD…
Figure : Keeping user ‘state’
using cookies
WORKING PRINCIPLE CONTD…
WHAT COOKIES CAN BRING
 Authorization
 Shopping carts
 Recommendations
 User session state (Web e-mail)
HOW TO KEEP STATE
 Protocol endpoints: maintain
state at sender/receiver over
multiple transactions
 Cookies: http messages carry
state
PRIVACY CONSIDERATIONS
 Third party cookies
if a user visits a site that contains content from a third party and then later visits
another site that contains content from the same third party, the third party can track
the user between the two sites
 User controls
User agents SHOULD provide users with a mechanism for managing the cookies stored
in the cookie store
 Expiration dates
Although servers can set the expiration date for cookies to the distant future, most
user agents do not actually retain cookies for multiple decades
SECURITY CONSIDERATIONS
 Ambient authority
 Clear text
 Session identifier
 Weak confidentiality
 Weak integrity
COOKIE AUTHENTICATION
GUIDELINES
 Use SSL for username/password authentication
 Do not store plain text or weakly encrypted password in a cookie
 The cookie should not be re-used or re-used easily by another person
 Password or other confidential info should not be able to be extracted from
the cookie
 Cookie authentication credential should NOT be valid for an over extended
length of times
 Set up “booby trapped” session tokens that never actually get assigned but will
detect if an attacker is trying to brute force a range of tokens.
COOKIE AUTHENTICATION GUIDELINES
CONTD…
(Whenever possible) Tie cookie authentication to an IP address (part or all
of the IP address)
 Adding “salt” to your cookie (e.g. hashed http header of a particular
browser, MAC address)
 Re-authenticate whenever critical decisions are made
 Over write tokens upon logout.
 Consider using server side cache to store session information, only retain
an index to the cache on the client side (also use ‘booby trapped’ indices)
Thank
You!
Questions & Answers Session

More Related Content

PPT
Internet cookies
PPT
Presentation on Internet Cookies
PPTX
Internet Cookies
PPT
Internet cookies
PDF
Alice Phieu - WordPress For Beginners
PPT
Web Cookies
PPTX
Cookies and sessions
PPTX
Introduction to WordPress
Internet cookies
Presentation on Internet Cookies
Internet Cookies
Internet cookies
Alice Phieu - WordPress For Beginners
Web Cookies
Cookies and sessions
Introduction to WordPress

What's hot (20)

PPTX
Basic Wordpress PPT
PPT
WebCrawler
PPSX
Sessions and cookies
PPTX
Content Management System
PDF
Http security response headers
PPTX
About Best friends - HTML, CSS and JS
PPT
spyware
PPTX
cyber security presentation.pptx
PPTX
Internet privacy presentation
PDF
Online Privacy
PPTX
Man in-the-middle attack(http)
PDF
Cross Origin Resource Sharing
PPTX
Security testing
PPT
“Web crawler”
PPTX
Web application security
PPTX
Content security policy
PDF
CNIT 123 Ch 10: Hacking Web Servers
PPTX
Web design - How the Web works?
PPTX
Different Types Of Websites - With Basic Information
PPT
Introduction to Web Application Penetration Testing
Basic Wordpress PPT
WebCrawler
Sessions and cookies
Content Management System
Http security response headers
About Best friends - HTML, CSS and JS
spyware
cyber security presentation.pptx
Internet privacy presentation
Online Privacy
Man in-the-middle attack(http)
Cross Origin Resource Sharing
Security testing
“Web crawler”
Web application security
Content security policy
CNIT 123 Ch 10: Hacking Web Servers
Web design - How the Web works?
Different Types Of Websites - With Basic Information
Introduction to Web Application Penetration Testing
Ad

Similar to Cookies: HTTP state management mechanism (20)

PPTX
Cookie testing
PPTX
Cookies
PPTX
Cookies: A brief Introduction
PPTX
19_JavaScript - Storage_Cookies-tutorial .pptx
PPTX
WORKING WITH IN COOKIES JAVA SEMINAR.pptx
PPTX
Cookies
PPTX
Overview of Cookies in HTTP - Miran al Mehrab
PDF
Cookie replay attack unit wise presentation
PPTX
Enterprise java unit-2_chapter-2
PPTX
Working with in cookies java seminar.pptx
PPTX
19_JavaScript - Storage_Cookies_students.pptx
PPT
MCDM State Management
PPSX
Cookies and session
PPTX
Advance java session 7
PPT
Electronic computer cookies
PPTX
Cookies testing
PPT
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
PPTX
Cookies and Session
PPTX
Ch4(saving state with cookies and query strings)
Cookie testing
Cookies
Cookies: A brief Introduction
19_JavaScript - Storage_Cookies-tutorial .pptx
WORKING WITH IN COOKIES JAVA SEMINAR.pptx
Cookies
Overview of Cookies in HTTP - Miran al Mehrab
Cookie replay attack unit wise presentation
Enterprise java unit-2_chapter-2
Working with in cookies java seminar.pptx
19_JavaScript - Storage_Cookies_students.pptx
MCDM State Management
Cookies and session
Advance java session 7
Electronic computer cookies
Cookies testing
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
Cookies and Session
Ch4(saving state with cookies and query strings)
Ad

More from Jivan Nepali (8)

PPTX
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
PPTX
Library System Implementation with JavaFx
PPTX
Warehouse based Intelligent Banking Transaction Analysis System
PPTX
Tourism market segmentation in context of nepal
PPTX
Decision Support and Knowledge Based Systems
PPTX
Grid computing the grid
PPTX
Restaurant Guide: A GPS based Android App
PPT
Project time management
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
Library System Implementation with JavaFx
Warehouse based Intelligent Banking Transaction Analysis System
Tourism market segmentation in context of nepal
Decision Support and Knowledge Based Systems
Grid computing the grid
Restaurant Guide: A GPS based Android App
Project time management

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
01-Introduction-to-Information-Management.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Types and Its function , kingdom of life
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
human mycosis Human fungal infections are called human mycosis..pptx
TR - Agricultural Crops Production NC III.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
GDM (1) (1).pptx small presentation for students
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
2.FourierTransform-ShortQuestionswithAnswers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?

Cookies: HTTP state management mechanism

  • 2. OUR TEAM Bibek Subedi, 066 BCT 506 Dinesh Subedi, 066 BCT 512 Laxmi Kadariya, 066 BCT 518 Jivan Nepali, 066 BCT 517 June 19, 2013
  • 3. PRESENTATION OUTLINE  INTRODUCTION – Definition, Types, Purpose, Syntax & Semantics of Cookies  COOKIE TECHNOLOGY – Components, Working Principle & Storage Model  COOKIE: PRIVACY CONSIDERATIONS  COOKIE: SECURITY CONSIDERATIONS  COOKIE AUTHENTICATION GUIDELINES
  • 4. INTRODUCTION  A “cookie” is a small piece of information sent by a web server to store on a web browser so it can later be read back from that browser. This is useful for having the browser remember some specific information.  Cookies were designed to be a reliable mechanism for websites to remember the state of the website or activity the user had taken in the past  Although cookies cannot carry viruses, and cannot install malware on the host computer, tracking cookies and especially third-party tracking cookies are commonly used as ways to compile long-term records of individuals’ browsing histories – Privacy Concern
  • 5. PURPOSE OF COOKIES  Cookies make the interaction between users and web sites faster and easier  Web sites often use cookies of the purpose of collecting demographic information about their users.  Cookies enable web sites to monitor their users’ web surfing habits and profile them for marketing purposes  With the increasing commercial applications of the Internet, it was probably inevitable that cookies would quickly be utilized for advertising purposes.  Since cookies can be matched to the profile of a user’s interests and browsing habits, they are a natural tool for the “targeting” of advertisements to individual users.
  • 6. TYPES OF COOKIES  Session or Transient cookies Cookies that are stored in the computer’s memory only during a user’s browsing session and are automatically deleted form the user’s computer when the browser is closed.  Permanent, Persistent or Stored cookies Permanent cookies can be used to identify individual users, so they may be used by web sites to analyze users’ surfing behavior within the web site. They are usually configured to keep track of users for a prolonged period of time, in some cases many years into the future.
  • 7. SYNTAX & SEMANTICS OF COOKIES 1. Cookie Name ◦ public String getName(); ◦ public void setName(String name); 2. Cookie Value ◦ public String getValue(); ◦ public void setValue(String value); 3. Cookie Version ◦ public String getVersion(); ◦ pulic void setVersion(String domain); 4. Cookie Age ◦ public in getMaxAge(); ◦ public void setMaxAge(int lifetime);
  • 8. EXAMPLE- SYNTAX & SEMANTICS (Java) Creating a Cookie Step 1: Create a Cookie instance by calling the Constructor Cookie cookie = new Cookie() Step 2: Set the name and value of the Cookie cookie.setName(“ID”); cookie.setValue(5); (Both step can be done directly using Cookie cookie = new Cookie(“ID”,5) Step 3: Set and maximum age and version of Cookie cookie.setMaxAge(2500); cookie.setVersion(1); Step 4: Finally add the cookie object to the response object Response.addCookie(cookie);
  • 9. COOKIE COMPONENTS  HTTP is stateless. But, if an website wants to keep track the identity of its user, then HTTP uses cookie for this purpose.  Cookie technology has following four components o A cookie header line in the HTTP response message o A cookie header line in the HTTP request message o A cookie file kept in the user’s end system & managed by the user’s browser o A back-end database at the website
  • 10. WORKING PRINCIPLE:USER-SERVER INTERACTION  Suppose Susan, who always accesses the Web using Internet Explorer from her home PC, contacts amazon.com for the first time.  Let us suppose that in the past she has already visited the eBay site – ebay.com.  When the HTTP request comes in the Amazon’s web server, it creates ◦ unique Identification number ◦ entry in backend database that is indexed by the Identification number for Susan
  • 11. WORKING PRINCIPLE CONTD… Figure : Keeping user ‘state’ using cookies
  • 12. WORKING PRINCIPLE CONTD… WHAT COOKIES CAN BRING  Authorization  Shopping carts  Recommendations  User session state (Web e-mail) HOW TO KEEP STATE  Protocol endpoints: maintain state at sender/receiver over multiple transactions  Cookies: http messages carry state
  • 13. PRIVACY CONSIDERATIONS  Third party cookies if a user visits a site that contains content from a third party and then later visits another site that contains content from the same third party, the third party can track the user between the two sites  User controls User agents SHOULD provide users with a mechanism for managing the cookies stored in the cookie store  Expiration dates Although servers can set the expiration date for cookies to the distant future, most user agents do not actually retain cookies for multiple decades
  • 14. SECURITY CONSIDERATIONS  Ambient authority  Clear text  Session identifier  Weak confidentiality  Weak integrity
  • 15. COOKIE AUTHENTICATION GUIDELINES  Use SSL for username/password authentication  Do not store plain text or weakly encrypted password in a cookie  The cookie should not be re-used or re-used easily by another person  Password or other confidential info should not be able to be extracted from the cookie  Cookie authentication credential should NOT be valid for an over extended length of times  Set up “booby trapped” session tokens that never actually get assigned but will detect if an attacker is trying to brute force a range of tokens.
  • 16. COOKIE AUTHENTICATION GUIDELINES CONTD… (Whenever possible) Tie cookie authentication to an IP address (part or all of the IP address)  Adding “salt” to your cookie (e.g. hashed http header of a particular browser, MAC address)  Re-authenticate whenever critical decisions are made  Over write tokens upon logout.  Consider using server side cache to store session information, only retain an index to the cache on the client side (also use ‘booby trapped’ indices)