<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Minimizing memory damage from bot-created sessions in ColdFusion</title>
	<atom:link href="http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/feed" rel="self" type="application/rss+xml" />
	<link>http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion</link>
	<description></description>
	<lastBuildDate>Thu, 01 Jun 2017 18:51:00 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.9.2</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>By: SitePoint Blogs &#187; The Week in ColdFusion: 26 March-1st April: No fooling here</title>
		<link>http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/comment-page-1#comment-45765</link>
		<dc:creator>SitePoint Blogs &#187; The Week in ColdFusion: 26 March-1st April: No fooling here</dc:creator>
		<pubDate>Thu, 03 Apr 2008 14:18:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/#comment-45765</guid>
		<description>[...] Brian Ghidinelli shares a technique to minimize memory usage by bots in applications using session management [...]</description>
		<content:encoded><![CDATA[<p>[...] Brian Ghidinelli shares a technique to minimize memory usage by bots in applications using session management [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: brian</title>
		<link>http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/comment-page-1#comment-45572</link>
		<dc:creator>brian</dc:creator>
		<pubDate>Fri, 28 Mar 2008 01:29:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/#comment-45572</guid>
		<description>@Geoff, good question.  It will treat the second request from a legitimate client as a new session, but in my opinion that is OK.  Since 99% of the time the user needs to enter a username or password or something, it doesn&#039;t matter much that the session is reset after the first page view.  Another option would be to set the &quot;short&quot; session to something like 2 minutes; a reasonable enough time frame for a legitimate user to click again and maintain their initial request but short enough to let ColdFusion clear out the related memory variables.  Charlie Arehart has some related content on his site about client variables and bots as well that&#039;s worth checking out too.

In writing this response, I can think of two places in my app where the ultra short timeout might be a problem:  URL variables can trigger a non-default theme which is stored in the session and when users forget their passwords, we send them a temporary reset token via email.  That token logs them in automatically so losing their session could be a problem.  Although in the latter case at least, we redirect them to the password page after authentication so I think they would get both requests in in quick succession.

I will probably revisit my setting to be a little more lenient.  Since my real sessions last for as long as an hour, this will still provide lots of protection against spiraling memory use.

Great comment!</description>
		<content:encoded><![CDATA[<p>@Geoff, good question.  It will treat the second request from a legitimate client as a new session, but in my opinion that is OK.  Since 99% of the time the user needs to enter a username or password or something, it doesn&#8217;t matter much that the session is reset after the first page view.  Another option would be to set the &#8220;short&#8221; session to something like 2 minutes; a reasonable enough time frame for a legitimate user to click again and maintain their initial request but short enough to let ColdFusion clear out the related memory variables.  Charlie Arehart has some related content on his site about client variables and bots as well that&#8217;s worth checking out too.</p>
<p>In writing this response, I can think of two places in my app where the ultra short timeout might be a problem:  URL variables can trigger a non-default theme which is stored in the session and when users forget their passwords, we send them a temporary reset token via email.  That token logs them in automatically so losing their session could be a problem.  Although in the latter case at least, we redirect them to the password page after authentication so I think they would get both requests in in quick succession.</p>
<p>I will probably revisit my setting to be a little more lenient.  Since my real sessions last for as long as an hour, this will still provide lots of protection against spiraling memory use.</p>
<p>Great comment!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Geoff</title>
		<link>http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/comment-page-1#comment-45568</link>
		<dc:creator>Geoff</dc:creator>
		<pubDate>Thu, 27 Mar 2008 23:04:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.ghidinelli.com/2008/03/26/minimizing-memory-damage-from-bot-created-sessions-in-coldfusion/#comment-45568</guid>
		<description>I think this solution assumes a &#039;real&#039; visitor will click another page within 5 seconds - otherwise how will you know the difference between a user&#039;s first visit and a spider?

Along with the first page request, cookie information is sent to the browser - at this point, CF doesn&#039;t know you&#039;re not a real person, so gives you a 5 second session...

Yes, your cookie still exists, but if you&#039;ve not clicked a second page within 5 seconds, your initial session will have expired and CF will create a second 5-minute long session along with your next page view.</description>
		<content:encoded><![CDATA[<p>I think this solution assumes a &#8216;real&#8217; visitor will click another page within 5 seconds &#8211; otherwise how will you know the difference between a user&#8217;s first visit and a spider?</p>
<p>Along with the first page request, cookie information is sent to the browser &#8211; at this point, CF doesn&#8217;t know you&#8217;re not a real person, so gives you a 5 second session&#8230;</p>
<p>Yes, your cookie still exists, but if you&#8217;ve not clicked a second page within 5 seconds, your initial session will have expired and CF will create a second 5-minute long session along with your next page view.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
