Thanks for the support everyone. Still need more opinions if possible :-)
mrHappiness if i read what you wrote correctly, you suggest passing the sessionid from the SSL server to the non-secure website using hidden form fields?
(You had action="https" but in the logic flow for my site would be:
user goes to index.php (non-secure)
user clicks 'login'
user is redirected to SSL login.php
user logs in
user redirected to index.php (non-secure), but index.php does what we're discussing, and starts a new session (based on the old one) (somehow..)
Is it possible someone could view the source of the page, determine the names of my hidden form fields, then write their own page containing my hidden form field names, fill them with their own session id, and then post it to my index.php on the non-secure site (Have a computer program generate thousands of sid's and continue to hit the index.php until it hijacks a session)?
Would the idea be that since i'm storing this sid in the database, with a timestamp, there is a very low chance that in that window of time (perhaps an hour we'll say) that a cracker could even come close to hijacking a sessionid?
Thanks for your help thus far!
Regards,
Mike