- From: <noah_mendelsohn@us.ibm.com>
- Date: Fri, 2 May 2008 10:17:01 -0400
- To: "David Orchard" <orchard@pacificspirit.com>
- Cc: www-tag@w3.org
Dave: I took an action yesterday to review specifically your edits dealing with digest authentication. I'm glad to see that you followed up on the suggestion that digest may be acceptable when suitably strong passwords are chosen. The quibble I have is that you specifically suggest that only short alphanumeric strings can be cracked, and you imply that longer alphanumeric strings are the answer. I think both of those are questionnable calls at best, and unnecessary to the essence of the point. So, I suggest the following edits to your original: <original> The Digest method is subject to dictionary attacks when passwords are short common alphanumeric strings. An attacker can easily compute the digest for a large set of such common passwords then compare against the transmitted message. This can be mitigated by the use of significantly longer strings, but this is very rare practice on the web. The Digest method is subject to man in the middle attacks because an intermediary can degrade the quality of service to basic authentication. </original> <suggested> The Digest method is subject to dictionary attacks, and must not be used except in circumstances where passwords are known to be of sufficient length and complexity to thwart such attacks. The sophistication and power of dictionary-based exploits continues to increase; where before such attacks targeted only short passwords using common terms, modern approaches can be effective in "cracking" certain longer or more complex passwords as well. Great care must therefore be taken if digest authentication is to be used, and it should be noted that few systems in common use on the Web today ensure the use of sufficiently strong passwords. The Digest method is >also< subject to man in the middle attacks because an intermediary can degrade the quality of service to be >no better than that of< basic authentication. </suggested> I'm short on time at the moment, and I suspect that a bit of editorial work would result in somewhat more appealing prose, but I think the essence of the changes is important. Anyway, I believe this discharges my action, and I will go into tracker and close it. Thank you. Noah -------------------------------------- Noah Mendelsohn IBM Corporation One Rogers Street Cambridge, MA 02142 1-617-693-4036 -------------------------------------- "David Orchard" <orchard@pacificspirit.com> Sent by: www-tag-request@w3.org 05/02/2008 09:19 AM To: www-tag@w3.org cc: (bcc: Noah Mendelsohn/Cambridge/IBM) Subject: Updated passwordsInTheClear-52 Changes: Added comments about digest authentication and use of strong passwords. Previous changes Updated abstract. Changed SHOULD NOT send passwords in the clear to MUST NOT and related text Added information on Digest Authentication vulnerabilities and warning Added SSL/TLS configuration warning. http://www.w3.org/2001/tag/doc/passwordsInTheClear-52 http://www.w3.org/2001/tag/doc/passwordsInTheClear-52-20080501.html Cheers, Dave
Received on Friday, 2 May 2008 14:16:35 UTC