Hello everyone, I am Director Dabai(●—●). Today I want to talk to you about cookies, sessions, and tokens. This is what one of my reader friends encountered when he was interviewing for an internship position at WeChat. I would like to share it with you. picture Without further ado, let’s drive. 1. Upgrade the interactive experience of the websiteAs netizens, we use browsers to visit various websites every day to meet our daily work and life needs. picture The current interactive experience is still very smooth, but it was not like this in the early days. It was a one-time deal. 1.1 Stateless HTTP ProtocolWhat is the stateless http protocol? HTTP is a stateless protocol, which means that the protocol has no memory for business processing. It cannot remember what was done before. Each request is completely independent and does not affect each other. There is no context information. The lack of state means that if subsequent processing requires previous information, it must retransmit critical information, which may result in an increase in the amount of data transmitted per connection. If you don’t understand, think about this scene from “Charlotte’s Troubles”: You probably understand it now. If we keep using this native stateless http protocol, we may have to log in again every time we change a page. What's the point of that? Therefore, it is necessary to solve the statelessness of the http protocol and improve the interactive experience of the website, otherwise there will be no way to reach the stars and the sea. 1.2 SolutionThe only two parties interacting in the whole thing are the client and the server, so we must start with these two parties.
picture
picture 2. Cookie solutionCookies are always saved in the client. According to the storage location in the client, they can be divided into memory cookies and hard disk cookies. Memory cookies are maintained by the browser and saved in the memory. They disappear after the browser is closed. Their existence time is short. Hard disk cookies are saved in the hard disk and have an expiration time. Unless the user manually cleans them or the expiration time is reached, hard disk cookies will not be deleted. Their existence time is long. picture 2.1 Cookie definition and functionHTTP Cookie (also called Web Cookie or Browser Cookie) is a small piece of data sent by the server to the user's browser and saved locally. It will be carried and sent to the server the next time the browser makes a request to the same server. Cookies are usually used to inform the server whether two requests come from the same browser, such as keeping the user logged in. Cookies make it possible to record stable status information based on the stateless HTTP protocol. Cookies are mainly used in the following three aspects:
2.2 Server creates CookieWhen a server receives an HTTP request, the server can add a Set-Cookie option in the response header. After receiving the response, the browser usually saves the cookie, and then sends the cookie information to the server through the Cookie request header in each subsequent request to the server. In addition, the expiration time, domain, path, validity period, and applicable site of the cookie can be specified as needed. picture 2.3 Cookie interaction between B/Spicture The server sends cookie information to the user's browser using the Set-Cookie response header. A simple cookie might look like this: Every time the client makes a new request to the server, the browser will send the previously saved cookie information to the server through the Cookie request header. Let me visit Taobao and grab a package to see the real process: picture 2.4 ProblemsCookies are often used to mark users or authorized sessions. After being sent by the browser, they may be hijacked and used for illegal activities, which may cause the authorized user's session to be attacked, thus posing a security issue. Another situation is cross-site request forgery (CSRF). Simply put, for example, when you log in to a phishing website at the same time as logging in to a bank website, when you perform certain operations on the phishing website, you may obtain cookie information related to the bank website and initiate illegal activities such as transferring money to the bank website. Cross-site request forgery (CSRF), also known as one-click attack or session riding, is a method of attack that forces a user to perform unintended actions on a currently logged-in web application. Compared to cross-site scripting (XSS), XSS exploits the user's trust in a given website, while CSRF exploits the website's trust in the user's web browser. To put it simply, a cross-site request attack is when an attacker uses some technical means to trick the user's browser into visiting a website that the attacker has authenticated and performing some operations (such as sending emails, messages, or even financial operations such as transferring money and purchasing goods). However, there are many solutions to this situation, especially for financial sites such as banks, where any sensitive operations by users need to be confirmed, and cookies with sensitive information can only have a short life cycle. At the same time, cookies have limitations on capacity and quantity. Sending a lot of information each time will result in additional traffic consumption, and complex behavioral cookies cannot meet the requirements. picture Special note: The above problems only exist when Cookies are used to achieve interactive states, but they are not problems with Cookies themselves. Just think about it: kitchen knives can be used to cook, but they can also be used to commit certain violent acts. Can you say that kitchen knives should be abolished? 3. Session Solution3.1 Concept of Session MechanismIf Cookie is a client behavior, then Session is a server behavior. picture After the Cookie mechanism initially interacts with the server, all information needed to maintain the state will be stored on the client, and will be directly read and sent to the server for interaction. A session represents a conversation between a server and a browser and is completely controlled by the server, which implements functions such as assigning IDs, storing session information, and retrieving sessions. The Session mechanism stores all the user's activity information, context information, login information, etc. on the server side, and only generates a unique identification ID and sends it to the client. Subsequent interactions will not have repeated user information transmission, but will be replaced by a unique identification ID, which we will call Session-ID for now. 3.2 Simple interaction process
3.3 Session ImplementationFirst of all, it should be clear that there is no direct relationship between Session and Cookie. It can be considered that Cookie is just a way to implement the Session mechanism. Other methods can be used without Cookie.
There are two main ways to implement session: cookies and URL rewriting. Cookies are the preferred method because all modern browsers have the cookie function enabled by default. However, each browser also has a setting that allows cookies to expire. Therefore, a backup is needed for the Session mechanism. picture The technique of appending a session identification number as a parameter to the URL address of a hyperlink is called URL rewriting.
3.4 Problemspicture Since the session information is stored on the server, if the number of users is large, the space occupied by the session information cannot be ignored. For large websites, clustered and distributed server configurations are necessary. If the session information is stored locally, then due to the role of load balancing, the original request was made to machine A and the session information was stored. The next request may go to machine B, and there is no session information on machine B at this time. In this case, either duplicate creation on machine B causes waste, or a highly available Session cluster solution is introduced, a Session proxy is introduced to achieve information sharing, or customized hashing is implemented to cluster A, which is actually a bit complicated. picture 4. Token SolutionToken is a token that is generated by the server and issued to the client. It is a time-limited means of verifying identity. Token avoids the massive information storage problem brought by the Session mechanism, and also avoids some security issues of the Cookie mechanism. It has a wide range of uses in modern mobile Internet scenarios, cross-domain access and other scenarios. 4.1 Simple interaction processpicture
4.2 Token design conceptTaking JSON Web Token (JWT) as an example, the token mainly consists of three parts:
picture The information in the header and payload is not encrypted, only general base64 encoding is performed. After receiving the token, the server strips out the header and payload to obtain information such as the algorithm, user, and expiration time, and then generates a sign based on its own encryption key. It compares the consistency with the sign sent by the client to determine the legitimacy of the client's identity. In this way, the CPU encryption and decryption time is exchanged for storage space. At the same time, the importance of the server-side key is obvious. Once it is leaked, the entire mechanism collapses. At this time, HTTPS needs to be considered. 4.3 Characteristics of the Token Solution
5. SummaryCookies, Sessions, and Tokens are the products of different stages of development, and each has its own advantages and disadvantages. There is no obvious opposition between the three. Instead, they often appear together, which is why they are easily confused. Cookies focus on the storage of information, mainly client-side behavior, while Session and Token focus on identity authentication, mainly server-side behavior. The three solutions are still viable in many scenarios. Only by understanding the scenarios can you choose the appropriate solution. There is no silver bullet. That’s all I have to say. See you next time. |
<<: A 100% timeout murder caused by maxing out the bandwidth!
>>: What will be the consequences if all three major operators upgrade to 5G in five years?
Hosteons has updated its offer again, offering sp...
Everyone has a wireless router at home. However, ...
[[352016]] Recently, the three major domestic ope...
Judging from the current situation, 5.5G technolo...
5G technology has the characteristics and advanta...
[Original article from 51CTO.com] After the succe...
Just now, good news came from quantum entanglemen...
5G technology is developing globally, and Singapo...
"Carrier cloud" represented by China Te...
Get detailed information about your network conne...
In the network programming series, we implemented...
Faced with the ever-changing information security...
What is 5G? Do I need to change my SIM card? Can ...
Friendhosting has launched this year's Black ...
We work in weak current, and we have the most con...