- From: Brad Barber <bradb@geom.umn.edu>
- Date: Fri, 14 Jul 1995 13:35:05 +0500
- To: http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com
I'm glad to see that you are considering digest authorization for HTTP. I noticed a few security holes that may be of concern: - the server's digest database of H(<username> : <realm> : <password>) should receive highest security. To the knowledgeable user, it is the same as storing passwords in the clear. This is a weakness of the digest method. The passwd file in UNIX that is used for "basic" authorization may be released without compromising strong passwords. - the reuse of stale nonces is a convenience that allows a user to act as another user. The server should at least require that the return IP address be the same as before. - the <message-digest> places the nonce before the <message-body>. Cheswick & Bellovin '94 [Firewalls and Internet Security p.222] report a security hole noticed by Tsudik '92 [IEEE Infocom]. They recommend placing the nonce after the message. --Brad Barber Brad Barber, 116 Fayerweather St., Cambridge MA 02138 617-497-8876, barber@tiac.net, bradb@geom.umn.edu
Received on Friday, 14 July 1995 10:34:40 UTC