- From: David W. Morris <dwm@xpasc.com>
- Date: Mon, 16 Feb 1998 12:28:53 -0800 (PST)
- To: Jim Gettys <jg@pa.dec.com>
- Cc: Scott Lawrence <lawrence@agranat.com>, http-wg@cuckoo.hpl.hp.com, http-wg@hplb.hpl.hp.com
There is another problem with the re-write ... I'll comment below ...
On Mon, 16 Feb 1998, Jim Gettys wrote:
>
>
> > View: Browse HTML Browse Raw Text
> > From: "Scott Lawrence" <lawrence@agranat.com>
> > Date: Mon, 16 Feb 1998 11:18:48 -0500
> > To: jg@pa.dec.com (Jim Gettys)
> > Cc: http-wg@cuckoo.hpl.hp.com
> > Subject: Re: Security considerations from RE-AUTHENTICATION-REQUESTED
> >
> > I've attempted to provide a more general discussion of the issue of
> > cached credentials, appended below.
> >
> > >>>>> "JG" == Jim Gettys <jg@pa.dec.com> writes:
> >
> > JG> 15.6 Authentication Credentials and Idle Clients
> >
> > JG> Existing HTTP clients and user agents typically retain authentication
> > JG> information indefinately. HTTP/1.1. does not provide a method for an origin
> > JG> server or proxy to force reauthentication. Since clients may be idle for
> > JG> extended periods between use (and unauthorized users may have access to
> > JG> the user agent during these idle periods), this is a significant defect
> > JG> that requires further extensions to HTTP. This is currently under separate
> > JG> study. For user agents, there are a number of work-arounds to parts of
> > JG> this problem, and we enourage the use of password protection in screen
> > JG> savers, idle time-outs, and other methods which mitigate the security
> > JG> problems inherent in this problem.
> >
> > 15.6 Caching Authentication Credentials
> >
> > Existing HTTP clients and user agents typically retain authentication
> > information indefinately. HTTP/1.1. does not provide a method for a
> > server to direct clients to dicard these cached credentials. This is a
> > significant defect that requires further extensions to HTTP.
> > Circumstances under which this should be possible include but are not
> > limited to:
Beginning with "Circumstances", the wording of this sentence doesn't fit
semantically in the HTTP specification as it is justification for
the further extensions and not worded as a security concern. Perhaps
try:
Circumstances under which credential caching can interfere
with the application's security model include but are not
limited to:
> >
> > - Clients which have been idle for an extended period following which
> > the server may wish to cause the client to reprompt the user for
> > credentials.
> >
> > - Applications which include a session termination indication (such as
> > a 'logout' or 'commit' button on a page) after which the server side
> > of the application 'knows' that there is no further reason for the
> > client to retain the credentials.
> >
> > This is currently under separate study. For user agents, there are a
> > number of work-arounds to parts of this problem, and we enourage the use
> > of password protection in screen savers, idle time-outs, and other
> > methods which mitigate the security problems inherent in this problem.
> > In particular, user agents which cache credentials are encouraged to
> > provide a readily accessible mechanism for discarding cached credentials
> > under user control.
> >
> >
> OK, I've adopted this rewrite, with the exception of the "For user agents";
> since the work arounds are often server side rather than having anything
> to do with user agents.
> - Jim
>
>
Received on Monday, 16 February 1998 12:34:54 UTC