Re: No More Passwords In The Clear in HTTP!

At 1:49 PM 1/9/95, Daniel W. Connolly wrote:
>From: "Electronic Commerce Standards for the WWW (Spyglass)"
>http://www.spyglass.com/techreport/stdsec.htm

>|Simple Authentication - OPTIONAL
>|
>|This scheme, proposed by Spyglass, uses a random challenge sent from
>|the server to the client. The client encodes the random challenge
>|using the user's password as an encryption key in order to establish
>|authentication. See Note B for a full specification.
>|
>|This method is currently indicated as OPTIONAL, but Spyglass believes
>|that it should become REQUIRED for HTTP compliance.
>
>This was something of an eye-opener. It's so simple. We should have
>been doing this all along. There was never any reason to send
>passwords in the clear (well, uuencoded), given HTTP's two-round-trip
>authentication mechanism.

This does look like a good idea. My one concern is that we'd want to make
sure various extension mechanisms could live together before standardizing
an Extension: header, but they seem to think this is not essential to make
the protocol work.

(Is there any other MD5 PW authentication proposals for WWW lurking around
in draft form? I think I've seen this before, but I'm not sure, and I think
it's been done lately for other protocols, too.)

---
    Albert Lunde                      Albert-Lunde@nwu.edu

Received on Monday, 9 January 1995 12:56:39 UTC