AOL Users: Help?

Integra Type-R Discussion - Discuss general ITR information, technical information (including requests for technical/mechanical help/assistance), modifications, tuning, etc.
Locked
George Knighton
ITRCA Member
Posts: 418
Joined: September 12th, 2002, 8:12 am
Location: Culpeper Virginia (Besieged)
Contact:

AOL Users: Help?

Post by George Knighton »

I get an Invalid_Session error whenever I try to post from within the AOL client, and I know other people who get either this error or who appear not to be logged in and get prompted to log in, repeatedly, whenever they try to post.

If there's anyone out there who's posting from within the AOL client, I'd like to hear from you. You can reach me at "GeorgeKnighton AT aol DOT com" so I can find out how you're getting it to work.

It appears to be a problem with how and where phbb places the cookie, but I'm afraid to change that out of fear of preventing everyone else from being able to post.

I have played with every manner of privacy and security settings, but nothing will allow it to work while inside the client software.

This problem does not exist on any other message board.

I have used every version of AOL from 6.0 through the most recent versions (including the ones I'm not allowed to talk about), and the problem exists with every version.
George Knighton
ITRCA Member
Posts: 418
Joined: September 12th, 2002, 8:12 am
Location: Culpeper Virginia (Besieged)
Contact:

Post by George Knighton »

Test of Invalid_Session from Opera.

If this message shows up, then we do not have the problem if we call Opera instead of MSIE.
Trey
Site Admin
Posts: 1004
Joined: September 10th, 2002, 11:43 pm
Location: TN
Contact:

Post by Trey »

George Knighton wrote:Test of Invalid_Session from Opera.

If this message shows up, then we do not have the problem if we call Opera instead of MSIE.
I can see it
cetane
New ITRCA Member
Posts: 5
Joined: November 12th, 2002, 1:13 pm

Post by cetane »

George Please do your self a favor and get rid of aol. AOL is not the internet, its a bad version of it.
Chris N
Site Admin
Posts: 1679
Joined: November 6th, 2002, 7:08 pm
Location: Chicago, Illinois

Post by Chris N »

cetane wrote:George Please do your self a favor and get rid of aol. AOL is not the internet, its a bad version of it.
Agreed. AOL suxorz.
jetydosa
suite 200
Posts: 182
Joined: September 11th, 2002, 3:28 pm
Location: Atlanta GA

Post by jetydosa »

AOL? :lol:

I recall many years ago a co-worker asked one of my IT buddies if he had AOL. His response, "Do I have AOL? Hell no, I have the *REAL* internet!"
George Knighton
ITRCA Member
Posts: 418
Joined: September 12th, 2002, 8:12 am
Location: Culpeper Virginia (Besieged)
Contact:

Re: AOL Users: Help?

Post by George Knighton »

George Knighton wrote:the most recent versions (including the ones I'm not allowed to talk about), and the problem exists with every version.
I think more than a few people would be upset if I got rid of AOL.

What other ISP allows you to actually replicate data between different computers and different locations?

What other ISP has a server reliable enough to be used by some small governments?

A USENET server that continuously captures more posts and holds onto them longer than anyone else can afford?

How 'bout a few million users all sending 15 meg attachments at the same time? Can you even send a 15 meg file? Hmmm.

:P
Aj
Senior ITRCA Member
Posts: 801
Joined: September 17th, 2002, 7:39 pm

Post by Aj »

Well, if the argument is about AOL's gargantuan infrastructure, there is no real argument, they have put more money into R&D than most companies ever will...That being said, they're GUI is terrible to say the least, and hardly friendly to anyone shy of perhaps a 16 year old girl...hahaha... jk....but seriously, it's not to say that AOL as a company or provider or anything else is bad, but they put a lot of money into making their software so user friendly, it's often prohibitive, as you have found out...

So I gotta agree with the guys on this one, AOL really is a pain...

And yes, I use one of the Bell (Bell South) division companies to send 15 meg files and substancially larger all the time...

Later,
Aj
George Knighton
ITRCA Member
Posts: 418
Joined: September 12th, 2002, 8:12 am
Location: Culpeper Virginia (Besieged)
Contact:

Post by George Knighton »

So, basically, nobody has a clue about the subject of the thread?

Here's an answer from phpbb:

About Invalid_Session errors:

Some users may get an "Invalid_Session" error with the new forum software when posting a message or reply. This is due to a new "security" feature that I'm not particularly happy about -- or rather, I'm happy about the security feature but definitely not happy about the way it's implemented.

[phpbb-specific information snipped]

What is causing the problem:

Basically this feature protects against hacker attacks by giving every active user a Session ID, part of which is derived from your current IP address. If your Internet account uses dynamic IP addresses and a timeout so that your machine goes offline and then online again while you are composing posts your IP address will change and your Session ID will become invalid. phpBB will then assume that you're a hacker and not allow you to post.

Users of AOL worldwide and T-Online in Germany will be particularly strongly affected by this problem, as will all other users with providers who change the entire IP address every time you log on.

If you're interested in the technical details see this message from the phpBB staff:

http://www.phpbb.com/phpBB/viewtopic.php?t=69493

Workaround:

If you experience this problem while trying to post a message or reply do this:

1: Immediately click on BACK in your browser. This will display your editing screen with the text you just entered.

2: Copy all the text you wrote to the clipboard, then return to the forum and select New Message or Reply as appropriate for what you were trying to do.

3: Paste the text you just copied into the editing window and immediately click on SUBMIT, while your current session is still valid.

I'm the first to admit that this is a lousy solution. I'm going to be watching the situation closely over the next few days and if a lot of users experience problems with it I'm going to have to take some radical action.

Sorry for any inconvenience.
_________________
Regards,
Tim (Admin)

---------------------------------------------------------
Here's a more detailed answer from someone else:
---------------------------------------------------------


phpBB uses sessions to "track" users as they move between pages, forums, topics, etc. A session is made up of a unique 32 character session_id which identifies the current users. This value is stored in the sessions table and either a temporary (i.e. it's deleted when the browser window is closed) cookie on the users machine or if that doesn't seem to be working it's appended to all URLs.

The problem with using just a session_id is that it becomes very easy to hijack (takeover) a session. All a user need do is obtain the session_id and add it to the url as they browse the board. If the id they grab happens to be a logged in admin or moderator ... well you get the picture.

What we do to help complicate the situation is also tie the session to the users IP. Using this method someone would need to spoof an IP and obtain the session_id in order to hijack a session, not incredibly difficult but certainly harder ... and with this sort of software it's really a case of making everything harder to do, thus disuading all but the most ardent "hackers" from bothering to attempt anything.

How do we obtain this IP? We check the availability of two variables, REMOTE_ADDR and HTTP_X_FORWARDED_FOR. Firstly we check for HTTP_X_ ..., this is typically set by "nice" proxies, caches, etc. and contains "an" IP which may be the users "real" IP or some other IP. If that does not exist or it contains a private or restricted IP range (several blocks of IPs are reserved by the international bodies responsible for IP allocation) we instead use the value contained in REMOTE_ADDR. This variable typically contains the users real IP.

However, problems arise with how some ISPs operate their systems. Instead of forwarding the users real IP or indeed a different but static IP they simply make available only the IP of the proxy being browsed. The larger ISPs do not use a single proxy or cache, the load upon it and data passing through it would be far too great. Instead they use several systems in a "proxy farm" (I tend to refer to it as something containing most of those letters ... ). A user browsing the web may be switched between these machines from one page to another (to help distribute load), with the IP changing as they go.

Obviously a problem then exists in that phpBB's ability to tie a users session to a unique id and an IP fails ... because the IP is constantly changing. There are some "nice" ISPs out there that run these farms within a single "class" or block of IPs, e.g. 1.2.3.4, 1.2.3.5, 1.2.3.6, etc.

This is why in a previous release of phpBB we introduced a slightly reduced IP checking system which now checks only the first three "quads" of an IP, i.e. 1.2.3.4 is checked only for 1.2.3 the 4 is discarded. Remember, that an IPv4 address is 32bits wide, this is generally presented in the form of four 8 bit numbers. By checking just the first three numbers (24bits) we neglect 8 bits or 255 (253 in practice) possible IPs ... that's 253 seperate potential proxies ... IOW enough machines for practically any ISP on the planet. However we can go further and reduce that checking to just the first "two quads", that ignores 255 * 253 IPs!

The problem is some ISPs don't arrange their IP allocation particularly well, either for historical or other reasons ... AOL is one significant culprit. So what happens is that users can jump between completely different Class A (this is a full 32bit block of IPs) networks, e.g. 100.100.100.100 to 200.100.40.40, etc. This renders IP validation completely useless for such situations

So you ask, "Okay, but why did 2.0.3 not cause all these Invalid_session errors?!". The answer is fairly simple. When you first visit phpBB (assuming you have autologin enabled) it looks to see if you have a session_id (either in a cookie or the URL). On a new visit you won't have such a session_id and so phpBB creates a new one. If you have autologin set it checks the relevant data and if that matches you are logged in with the appropriate user_id. You can then immediately browse the board, post messages, do admin tasks (if applicable), etc.

Now let's take a situation where a naughty person creates a bogus form on their site. You are (for some reason) browsing this form. However, unknown to you this form contains all the necessary data to delete a pile of topics in a given forum (you having moderator rights on a certain board). When you submit that form it will be transmitted to the appropriate website. No session exists so phpBB, as noted above creates a new one and immediately processes the form data ... all the relevant topics are deleted from the database and you only find out when the boards "The selected topics have been deleted" message appears ...

To help negate the effectiveness of this we backported some code from phpBB 2.2 and introduced additional code. The admin control panel now appends your session_id to every url. When you browse within that panel it checks the session_id in the url with that stored in the sessions table. If they match, great, if they don't it redirects you back to the ACP index. This will help prevent users accidently, without their knowledge suffering issues as noted above.

Similarly the Moderator control panel has the session_id appended to urls and carries out a check. The difference here is that it throws up an Invalid session if the ids do not match, note that redirection like the admin panel wouldn't alter the result here ... if you tried submitting data via the MCP with an invalid session you'd just be returned to MCP front page ... losing any data entered previously. Other issues with voting and posting were also addressed thanks to a concerned user notifying us. Thus similar checks were put in place there.

The problem is that for users whose session is forever being renewed due to their IP changing this extra level of checking can cause issues. For many ISPs the noted changing of 6 to 4 in the IP validation check will be sufficient ... however AOL crops up (as per usual in nearly all similar situations with all software ...) as the sore thumb.

"What can you do about it?" you may ask, very little is the response. We could remove the extra validation but that leaves a gap that frankly I'm not prepared to leave ... if hadn't addressed this I would make a handsome bet that at some near future point we would've had users shouting and screaming about how damage was done to their boards and why didn't we (phpBB) fix it if we knew about it

What else can we do? As I said, very little that won't impact users completely unaffected by this issue (of which I'm betting there are a great many) ... in phpBB 2.2 we are introducing a feature to set the level of IP validation by the ACP, including disabling it completely. However disabling IP validation will, as noted leave your users open to simplified hijacking. For many people this may not be a problem and thus could be a solution. To do this in phpBB 2.0 you need to either remove the validation code from sessions.php or change the 6 to a 0 (the relevant lines are as noted in this topic). Be aware of what you are doing though and keep quiet about it ... if people don't know IP validation isn't operational they may believe it still is. If you have security issues you can trace to users sessions being hijacked we don't want to know about it

We could introduce a change to sessions whereby what happens when a new session is created is "weakened". What do I mean by weakened? Well, at present we generate a new session whenever we cannot validate an existing one. Instead what we could do is compare the users current session_id (if they have one) with that in the database. If a match is found and the time differential is some "small" number we instead continue that session. The problem here is that it's just as open to hijacking as removing IP validation. Why? Because that check will ignore the users IP and care only about the session_id ... and thus isn't something I'm keen on without direct admin control.

We could, as per a new Mod listed elsewhere on the board, ignore IP validation whenever the users IP is within a given list. While this isn't as bad as removing validation completely it's not terribly far off. Why? Because instead of having to go to some trouble to obtain a users current IP you can instead (given you know a user connects via a given ISP or proxy) just look it up ... you still need to spoof it but a step has been removed ... and as noted previously all we can do is make these peoples lives harder. There are additional issues with the extra processing required (which may or may not be significant depending on the number of IPs, users browsing, etc.) and of keeping the list up to date.

We could append a random set of alphanumerics to every single page, changing the value of it with every page view and storing the new data in the sessions table. This would add protection because a hijacker would need not only the session_id but also the current unique identifier. Of all the ideas this is probably my favourite and may make it into a future release (unless I've missed something obvious which renders it useless or bad for performance!).

[specific code to remove deleted for security reasons]

This removes the added security of validation so if you do this we aren't interested in any security related problems that may arise. I highly recommend that you do not remove the added security from the admin control panel.

There, that just about covers it I think ...
_________________
Paul S. Owen :: phpBB2 Lead Developer
Locked